Crisis-Resilient Security Protocols: Building Adaptive Cybersecurity for Critical Infrastructure under Political and Economic Turbulence:
Keywords:
Adaptive cybersecurity, critical infrastructure, crisis resilience, cybersecurity protocols, real-time response, political instabilityAbstract
This study investigates how to develop crisis-resistant cybersecurity practices to cover critical infrastructure and help it sustain a high level of stability during political and economic disturbances. The research focuses on resilient security designed to sustain critical services such as energy, healthcare and traffic operations under the uncontrollable circumstances. By utilizing the mixed research design (the data analysis and case studies), the study critiques the existing frameworks and reveals the significance of flexibility and prompt reaction to decrease the risk of cyber-attacks. Significant discoveries have indicated that effective measures are based on real-time surveillance, cross-country cooperation and ever-evolving alteration of systems. This paper focuses on the fact that the patch-and-pray approach to cybersecurity caused by the lack of a dynamic cybersecurity architecture result in the need to replace not only the crisis-reactive cybersecurity architecture but also the pre-emptive threats significantly reducing vulnerability. The study itself will add to the discussion on how to protect critical infrastructure against a changing set of risks to provide actionable intelligence that can be used by policymakers and people in the security industry. It gives guidelines to the way to increase resilience in the light changing political and economic environments.
References
Aljaidi, M., et al. (2022). NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures. 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), Zarqa, Jordan, 2022, pp. 1-6, doi: 10.1109/EICEEAI56378.2022.10050485.
Bechara, F. R., & Schuch, S. B. (2020). Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), 359–374. https://doi.org/10.1108/jfc-07-2020-0149
Cavelty, M. D., & Egloff, F. J. (2019). The Politics of Cybersecurity: Balancing Different Roles of the State. St Antony’s International Review, 15(1), 37–57. https://www.ingentaconnect.com/content/stair/stair/2019/00000015/00000001/art00004
Goel, R., Kumar, A., & Haddow, J. (2020). PRISM: A strategic decision framework for cybersecurity risk assessment. Information & Computer Security. https://doi.org/10.1108/ics-11-2018-0131
Guidotti, R., Chmielewski, H., Unnikrishnan, V., Gardoni, P., McAllister, T., & van de Lindt, J. (2016). Modeling the resilience of critical infrastructure: The role of network dependencies. Sustainable and Resilient Infrastructure, 1(3-4), 153–168. https://doi.org/10.1080/23789689.2016.1254999
Mintoo, A. A., Abu, Bakhsh, M. M., & Akter, M. (2022). National resilience through AI-driven data analytics and cybersecurity for real-time crisis response and infrastructure protection. 1(1), 137–169. https://doi.org/10.63125/sdz8km60
O. Fadi, Z. Karim, E. G. Abdellatif, and B. Mohammed, "A Survey on Blockchain and Artificial Intelligence Technologies for Enhancing Security and Privacy in Smart Environments," in IEEE Access, vol. 10, pp. 93168-93186, 2022, doi: 10.1109/ACCESS.2022.3203568.
Osei-Kyei, R., Tam, V., Ma, M., & Mashiri, F. (2021). Critical review of the threats affecting the building of critical infrastructure resilience. International Journal of Disaster Risk Reduction, 60, 102316. https://doi.org/10.1016/j.ijdrr.2021.102316
Panda, A., & Bower, A. (2020). Cyber security and the disaster resilience framework. International Journal of Disaster Resilience in the Built Environment, ahead-of-print(ahead-of-print). https://doi.org/10.1108/ijdrbe-07-2019-0046
Pemmasani, P. K., & Mohamad. (2022). Resilient IT strategies for governmental disaster response and crisis management. International Journal of Acta Informatica, 1(1), 151–163. https://yuktabpublisher.com/index.php/IJAI/article/view/254
Sullivan, J. E., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30–35. https://doi.org/10.1016/j.tej.2017.02.006
Zio, E. (2016). Critical infrastructures vulnerability and risk analysis. European Journal for Security Research, 1(2), 97–114. https://doi.org/10.1007/s41125-016-0004-2
Muniyandi, V. (2022). Harnessing Roslyn for advanced code analysis and optimization in cloud-based .NET applications on Microsoft Azure. International Journal of Communication Networks and Security, 14(4), 979-990.
Muniyandi, V. (2021). Extending Roslyn for custom code analysis and refactoring in large enterprise applications. International Journal of Science and Technology Research Archive, 3, 271-283.
Muniyandi, V. (2024). Design and Deployment of a Generative AI Copilot for Veterinary Practice Management Using Azure OpenAI and RAG Architecture. Available at SSRN 5342838.
Muniyandi, V. (2024). AI-Powered Document Processing with Azure Form Recognizer and Cognitive Search. Journal of Computational Analysis and Applications, 33(5).
Chellu, R. (2021). Secure Containerized Microservices Using PKI-Based Mutual TLS in Google Kubernetes Engine.
Chellu, R. (2022). Spectral Analysis of Cryptographic Hash Functions Using Fourier Techniques. Journal of Computational Analysis and Applications, 30(2).
Chellu, R. AI-Powered Intelligent Disaster Recovery and File Transfer Optimization for IBM Sterling and Connect: Direct in Cloud-Native Environments.
Chellu, R. (2024). Intelligent Data Movement: Leveraging AI to Optimize Managed File Transfer Performance Across Modern Enterprise Networks.
Chellu, R. Adaptive Quantum-Safe PKI Solutions for Nano-IoT Security Leveraging Cognitive Computing.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Well Testing Journal

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
This license requires that re-users give credit to the creator. It allows re-users to distribute, remix, adapt, and build upon the material in any medium or format, for noncommercial purposes only.