Crisis-Resilient Security Protocols: Building Adaptive Cybersecurity for Critical Infrastructure under Political and Economic Turbulence:

Authors

  • Tim Abdiukov NTS

Keywords:

Adaptive cybersecurity, critical infrastructure, crisis resilience, cybersecurity protocols, real-time response, political instability

Abstract

This study investigates how to develop crisis-resistant cybersecurity practices to cover critical infrastructure and help it sustain a high level of stability during political and economic disturbances. The research focuses on resilient security designed to sustain critical services such as energy, healthcare and traffic operations under the uncontrollable circumstances. By utilizing the mixed research design (the data analysis and case studies), the study critiques the existing frameworks and reveals the significance of flexibility and prompt reaction to decrease the risk of cyber-attacks. Significant discoveries have indicated that effective measures are based on real-time surveillance, cross-country cooperation and ever-evolving alteration of systems. This paper focuses on the fact that the patch-and-pray approach to cybersecurity caused by the lack of a dynamic cybersecurity architecture result in the need to replace not only the crisis-reactive cybersecurity architecture but also the pre-emptive threats significantly reducing vulnerability. The study itself will add to the discussion on how to protect critical infrastructure against a changing set of risks to provide actionable intelligence that can be used by policymakers and people in the security industry. It gives guidelines to the way to increase resilience in the light changing political and economic environments.

References

Aljaidi, M., et al. (2022). NHS WannaCry Ransomware Attack: Technical Explanation of The Vulnerability, Exploitation, and Countermeasures. 2022 International Engineering Conference on Electrical, Energy, and Artificial Intelligence (EICEEAI), Zarqa, Jordan, 2022, pp. 1-6, doi: 10.1109/EICEEAI56378.2022.10050485.

Bechara, F. R., & Schuch, S. B. (2020). Cybersecurity and global regulatory challenges. Journal of Financial Crime, 28(2), 359–374. https://doi.org/10.1108/jfc-07-2020-0149

Cavelty, M. D., & Egloff, F. J. (2019). The Politics of Cybersecurity: Balancing Different Roles of the State. St Antony’s International Review, 15(1), 37–57. https://www.ingentaconnect.com/content/stair/stair/2019/00000015/00000001/art00004

Goel, R., Kumar, A., & Haddow, J. (2020). PRISM: A strategic decision framework for cybersecurity risk assessment. Information & Computer Security. https://doi.org/10.1108/ics-11-2018-0131

Guidotti, R., Chmielewski, H., Unnikrishnan, V., Gardoni, P., McAllister, T., & van de Lindt, J. (2016). Modeling the resilience of critical infrastructure: The role of network dependencies. Sustainable and Resilient Infrastructure, 1(3-4), 153–168. https://doi.org/10.1080/23789689.2016.1254999

Mintoo, A. A., Abu, Bakhsh, M. M., & Akter, M. (2022). National resilience through AI-driven data analytics and cybersecurity for real-time crisis response and infrastructure protection. 1(1), 137–169. https://doi.org/10.63125/sdz8km60

O. Fadi, Z. Karim, E. G. Abdellatif, and B. Mohammed, "A Survey on Blockchain and Artificial Intelligence Technologies for Enhancing Security and Privacy in Smart Environments," in IEEE Access, vol. 10, pp. 93168-93186, 2022, doi: 10.1109/ACCESS.2022.3203568.

Osei-Kyei, R., Tam, V., Ma, M., & Mashiri, F. (2021). Critical review of the threats affecting the building of critical infrastructure resilience. International Journal of Disaster Risk Reduction, 60, 102316. https://doi.org/10.1016/j.ijdrr.2021.102316

Panda, A., & Bower, A. (2020). Cyber security and the disaster resilience framework. International Journal of Disaster Resilience in the Built Environment, ahead-of-print(ahead-of-print). https://doi.org/10.1108/ijdrbe-07-2019-0046

Pemmasani, P. K., & Mohamad. (2022). Resilient IT strategies for governmental disaster response and crisis management. International Journal of Acta Informatica, 1(1), 151–163. https://yuktabpublisher.com/index.php/IJAI/article/view/254

Sullivan, J. E., & Kamensky, D. (2017). How cyber-attacks in Ukraine show the vulnerability of the U.S. power grid. The Electricity Journal, 30(3), 30–35. https://doi.org/10.1016/j.tej.2017.02.006

Zio, E. (2016). Critical infrastructures vulnerability and risk analysis. European Journal for Security Research, 1(2), 97–114. https://doi.org/10.1007/s41125-016-0004-2

Muniyandi, V. (2022). Harnessing Roslyn for advanced code analysis and optimization in cloud-based .NET applications on Microsoft Azure. International Journal of Communication Networks and Security, 14(4), 979-990.

Muniyandi, V. (2021). Extending Roslyn for custom code analysis and refactoring in large enterprise applications. International Journal of Science and Technology Research Archive, 3, 271-283.

Muniyandi, V. (2024). Design and Deployment of a Generative AI Copilot for Veterinary Practice Management Using Azure OpenAI and RAG Architecture. Available at SSRN 5342838.

Muniyandi, V. (2024). AI-Powered Document Processing with Azure Form Recognizer and Cognitive Search. Journal of Computational Analysis and Applications, 33(5).

Chellu, R. (2021). Secure Containerized Microservices Using PKI-Based Mutual TLS in Google Kubernetes Engine.

Chellu, R. (2022). Spectral Analysis of Cryptographic Hash Functions Using Fourier Techniques. Journal of Computational Analysis and Applications, 30(2).

Chellu, R. AI-Powered Intelligent Disaster Recovery and File Transfer Optimization for IBM Sterling and Connect: Direct in Cloud-Native Environments.

Chellu, R. (2024). Intelligent Data Movement: Leveraging AI to Optimize Managed File Transfer Performance Across Modern Enterprise Networks.

Chellu, R. Adaptive Quantum-Safe PKI Solutions for Nano-IoT Security Leveraging Cognitive Computing.

Published

31-12-2024

How to Cite

Abdiukov, T. (2024). Crisis-Resilient Security Protocols: Building Adaptive Cybersecurity for Critical Infrastructure under Political and Economic Turbulence:. Well Testing Journal, 33(S2), 733–749. Retrieved from https://welltestingjournal.com/index.php/WT/article/view/186

Issue

Section

Research Articles

Similar Articles

<< < 1 2 3 4 5 6 > >> 

You may also start an advanced similarity search for this article.