• Nie Znaleziono Wyników

“N “ NI IC CO OL L AE A E B Bą ą LC L CE ES SC CU U” ” LA L AN ND D F FO OR RC CE ES S A AC CA AD D EM E MY Y

N/A
N/A
Protected

Academic year: 2022

Share "“N “ NI IC CO OL L AE A E B Bą ą LC L CE ES SC CU U” ” LA L AN ND D F FO OR RC CE ES S A AC CA AD D EM E MY Y "

Copied!
8
0
0

Pełen tekst

(1)

“N NI IC CO OL L AE A E B ą LC L CE ES SC CU U” LA L AN ND D F FO OR RC CE ES S A AC CA AD D EM E MY Y

T T h h e e 2 2 1 1 st s t I I n n t t e e r r n n a a t t i i o o n n a a l l C C o o n n f f e e r r e e n n c c e e T T h h e e K K n n o o w w l l e e d d g g e e - - B B a a s s e e d d O O r r g g a a n n i i z z a a t t i i o o n n

TECHNICAL SCIENCES

CO C O NF N FE E R R E E NC N CE E P P RO R O CE C EE E DI D IN NG G S S 3 3

11-13 JUNE 2015

Š

Š Š “N NI IC CO OL LA AE E B ąL LC CE ES SC CU U” L L AN A ND D F FO OR RC CE ES S A AC CA AD DE EM MY Y PU P UB BL LI IS SH HI IN NG G H HO OU US SE E

SI S IB BI I U, U , 2 20 015

(2)

Scientific advisors:

CO C OL L P Pr r of o f. .E En ng g P Pa au ul l B BE EC CH HE ET T, , Ph P hD D CO C OL L Pr P r of o f. .E E ng n g D Ćn nu Ħ M MO ûT TE EA AN NU U, , P Ph hD D CO C OL L Pr P r of o f. . V Va as si il le e C ąR RU ĥA ûU U, , P Ph hD D CO C OL L. . A As ss so o c. c .P Pr ro of f . . Io I oa an n V VI IR RC CA A, , P Ph hD D Pr P r of o f. . R ób be e rt r t S SZ ZA AB BO OL L CS C SI I, , P Ph hD D P Pr ro of f. .E En ng g. . O Oc ct ta av vi ia an n BO B OG GD DA AN N, , P Ph hD D P

Pr ro of f . . V V as a si il le e D DO OB BR RE EF F, , P Ph hD D Pr P ro of f .E . En ng g. . S Si im mo on n a a MI M IC CL ąU û

As A ss so oc c. .P Pr r of o f . . L Lu um mi in n i Ħ a a G GI IU UR RG GI IU U, , P Ph hD D A

As ss so oc c. . Pr P r of o f. . S Si il lv vi iu u P PE ET TR RI ûO OR R, , P Ph hD D

LT L T. .C CO OL L A As ss so oc c. . Pr P r of o f . . N Ni ic co ol la ae e M MO OR RO O, , P Ph hD D LT L T. . CO C OL L. . A As ss s is i s t. t . P Pr ro of f. . F Fl lo or ri in n I IL L IE I E, , P Ph hD D As A ss s is i s t. t . P Pr ro of f. . Ro R o ma m an na a O OA AN NC CE EA A, , P Ph hD D As A ss si is s t. t . P Pr ro of f . . E Em mi il l T TE EO OD DO OR RU U, , P Ph hD D

L LT TC C D Di ip pl l. . E En ng g. . P Pa av v el e l O OT ġÍ ÍS SA AL L , , P Ph hD D E

E ng n g. .G Ga ab br r ie i e l l E EP PU UR RE E, , P Ph hD D

Copyright: out of charge, all reproductions are authorized provided

that specific references are made.

³1LFRODH%ăOFHVFX´/DQG)RUFHV$FDGHP\

Address: 3-5HYROXĠLHL6WUHHW6LELX Tel.: 0269/432990, Fax: 0269/215554 E-mail: office@armyacademy.ro E-mail: editura@armyacademy.ro web: www.armyacademy.ro

web: www.armyacademy.ro/editura

The authors take full responsibility of the content of their articles.

ISSN 1843 – 6722

(3)

ICT SECURITY OF A STATE

Mirosáaw SMOLAREK, Marek WITKOWSKI,

The General Tadeusz Kosciuszko Military Academy of Land Forces, Wroclaw, Poland,

m.smolarek@wso.wroc.pl, m.witkowski@wso.wroc.pl

Abstract:The paper presents the impact of the reliable ICT systems on efficient and safe functioning of a state. Moreover risks which faced communication and information systems have been presented.

Furthermore authors proposed their own solutions that may improve the level of security of transmitted information. Then they indicated ICT systems that can be used for providing continuous and flawless exchange of information, with particular emphasis on the need of protection of information from unauthorized access, modification or destruction. Also some suggestions have been proposed for the modernization of IT systems, which could improve the secure dataflow and ensure continuous exchange of information between the components responsible for the security of the state.

Keywords: Information and Communication Technologies, ICT systems, secure communication, state security management system

1. Introduction

Well-functioning communication systems are particularly important for military as well as non-military structures, which are actively involved in safeguarding the security of a state. Means used in communication and information technology are often called ICT critical infrastructure of the state, and are essential for the safe and uninterrupted functioning of the country. Ensuring the proper functioning of this type of infrastructure would contribute to the smooth flow of information and providing safety for the management systems used for efficient administrating of the state-run institutions and other aspects of national security. Thus, the institutions and organisations responsible for the security of the individual components of the system will be able to receive and provide real-time information about the anticipated and real dangers and hazards. On this basis it should be possible to conduct proper

decision-making processes and take the appropriate measures and actions adequate to the given situation. Well-coordinated reaction and quick response to the arising threats could ensure restoring conditions from the pre-crisis time.

2. Threats for ICT security

Accidental or organized (targeted) attacks on ICT systems and networks can occur in many forms, for example as:

x damages caused to fixed ICT infrastructure;

x interference in radio frequencies;

x electronically distributed viruses, worms, Trojan horses, malware, spyware, etc.;

x blocking access to vital services (governmental, public administration, military, law enforcement or finance systems);

x hacking into databases, applications or other programs;

x destabilizing or taking complete control

95

(4)

over ICT systems;

x forging crucial data (e.g. election results).

Above presented possibilities of attacks, not only in cyberspace, are only some examples of methods used for destabilisation of communication and information technology systems. Furthermore the methods which are used nowadays to achieve the goals by various groups, organizations or terrorist extremist factions, are still under development. That is why persons and institutions responsible for ICT security have to be prepared for new forms of attacks in the future.

With the current saturation of information equipment and the use of the Internet as a main mean for data transfer – one can state that computers are one of the most significant threats to ICT security. This new type of hazards in the network-centric environment are referred as “cyber threats”

or commonly a term “cyber terrorism” is used. Particularly significant cyber threats can include those that are directed to incapacitate critical infrastructure of the state. The aim of the "electronic attack" can be military and non-military structures of a particular country or group of countries.

The most dangerous cyber-attacks are those which are aimed against ICT infrastructure responsible for the flawless functioning of the following systems responsible for:

x national security management;

x protection and defence of the state;

x crisis management;

x warning and alarming;

x state and local government;

x support (e.g.the economic, social etc.);

x widely understood control and monitoring (e.g. in the energy or transport sectors).

In above mentioned systems appropriate protection measures should be taken, that will ensure their functioning in all conditions in order to prevent damage to or destruction of ICT critical infrastructure.

Ensuring continuous communication between the elements which are responsible

for the security of the state is particularly important in situations of imminent threat to the state and its citizens. Therefore it is essential to ensure the appropriate level of security for data communication systems and the efficient exchange of information.

As mentioned earlier, the serious threat to these systems are the risks that may occur in cyberspace. Such threats may arise as a result of unintentional or intentional acts of a different nature, extent and intensity that can be targeted to a specific country or system.

Therefore, the fight against cybercrime should be conducted in an organized way and have dimensions which range from national to international levels. For example, the fighting against cyber-attacks could be organised in framework of cooperation between various organisations, institutions, departments and agencies that are responsible for the state security.

Moreover, the continuous exchange of information about the potential risks should also take place at the level of international institutions and organizations. As an example of such cooperation one could mention the European Cybercrime Centre (EC3) at Europol. The organisation collects and processes data on cybercrime, and then distributes the crucial pieces of information to the member states of the European Union [1].

The risk assessments prepared by EC3 allow to maintaining databases, conducting analysis, forecasting and identifying trends in potential threats. Information obtained in this way may be beneficial for improving the effectiveness of an early warning system against cyber-attacks.

The protection of information systems against potential dangers is called by a collective term “cyber security”. In protecting the web community are involved several agencies, institutions and organizations, which were set up in order to respond to security incidents on the Internet. The main international bodies are:

x ENISA (European Union Agency for Network and Information Security) [2];

(5)

x CERT (Computer Emergency Response Team) [3];

x CSIRT (Computer Security Incident Response Team) [4];

x IWPITC (INTERPOL Working Parties on IT Crime) [5];

x CCDCE (Cooperative Cyber Defence Centre of Excellence) [6].

Joint actions for IT security, improve the effectiveness of the fight against cybercrime. Appropriately structured cooperation, exchange of experience and the threat databases could provide better protection and conduct continuous operations in case of crisis situations.

Therefore, a very important task for the protection ICT systems used by the structures responsible for the security of the state is a comprehensive approach to the subject of study.

3. Counteraction to the threats

Effective prevention of ICT infrastructure against the potential dangers requires proper organisational measures and use of reliable IT systems which should ensure:

obtaining information about the structure and location of the criminal or terrorist groups;

x acquiring data about preparation for potential attacks, venues and endangered objects;

x processing of the obtained pieces of information;

x collection and storage of data regarding potential enemy groups, their methods, techniques and principles of operation;

x exchange of information between counterparts responsible for the security of the state, with simultaneous ensuring safety procedures and protection of databases against unauthorized access.

Implementation of the above mentioned undertakings and information processes requires the use of modern information and communication technologies, information management programs and other modules (applications) which could enhance and support decision making processes. Having a reliable means of communication,

especially in a time of appearing of military and/or non-military threats, should provide immediate notification of the authorities who are responsible for ensuring safety in emergency situations.

Obtained information will also allow to dispatch appropriate forces and means for the area in which the threat appeared.

Comprehensive approach to the issues related to ensuring the exchange of information should base on a reliable telecommunications infrastructure for the needs of national security. Furthermore, if the ICT systems should be compatible with the systems of other countries and in addition an exchange of information at the international level should be provided. This approach will ensure the continuity of operating of institutions, bodies and services which are responsible for the security of the state and its citizens.

Interference in the trans-mission of information or a complete incapacitation of ICT systems may adversely affect the process of making adequate decisions.

Moreover, this kind of disturbance could contribute to a significant delay or total lack of response to arising threats. Improper flow of information between the governing and executive bodies may result in a lack of coordination in organised assistance and contribute to the escalation of the threats.

Therefore, it is essential that ICT systems, used by the authorities responsible for national security, should be reliable and have to be a subject to special protection.

4. Proposed changes for ensuring ICT security

One can state, that issues related to cyber security, should focus on the following areas:

x technical;

x physical;

x human resources;

x organisational;

x legal.

Only such a comprehensive approach to the above-described areas could ensure uninterrupted data transmission in all

97

(6)

circumstances. This applies to the transfer of the necessary information about the aforementioned activities between the decision-making bodies at the local, national as well as international levels.

According to the above-mentioned areas, the model of the ICT systems for emergency situations should be based on a variety of IT equipment and media transmission devices. This approach should ensure the efficient exchange of information between military and non- military authorities, public administration representatives, security and public order services.

This task, however, requires a systematic attitude to issues related to the construction of a modern infrastructure. The preparation of such infrastructure is not an easy task, because it demands a detailed analysis, specialized studies and considerable funding for such projects. However, this approach will help to determine the most reliable IT systems that ensure efficient flow of information in all circumstances.

Based on their own research, the authors suggest that building of such systems should be not limited only to one group of data transfer and communication equipment sets and transmission channels (lines), but rather various and non-conventional solutions should be applied. The use of different means and devices of communication and broadcasting media, should ensure incessant circulation of information. This is due to the fact that in the case of damage or destruction of one data communications system (e.g. during cyber-attack) it should be possible to transfer the information by other, even

“older” means, and communications channels to the decisive bodies responsible for the security of the state.

The ICT means that can be used for efficient and secure exchange of information are:

x wired communication systems - based largely on fixed communications lines, which operate on the basis of fixed infrastructure. To this group one can

include all kinds of telephone switchboards, telephones and fax machines, which are the main transmission medium for cable networks;

x wireless communication systems - which transmit information by use of radio waves. These are mainly: radio stations, radiotelephones, mobile and satellite phones and services;

x information systems - these are mainly computers, laptops, and tablets with the secure software systems, applications and support software. To this group one can add devices such as: printers, plotters, scanners and telefaxes.

All the above-mentioned groups of communications means, ICT systems and telecommunications infrastructure (fixed and wireless) must be prepared for simultaneous and/or alternative use for information exchange between the institutions which are responsible for the security of the state. Although it is particularly important to increase the amount of wireless communication equipment, because this type of devices can operate in virtually all environmental circumstances. This is due to the fact that such devices use electromagnetic waves for transferring information, which are not dependent on fixed infrastructure or the Internet. In addition, both radiotelephones, as well as mobile and satellite phones have their own power supplies, so they will be able to operate in the moments when the national power grid is damaged or destroyed. Another advantage of wireless means is that they can be used in places where wired systems ceased to function or even when in a given area does not exist a fixed comms infrastructure.

Modern IT infrastructure built for the needs of national security should be primarily based on mobile communications components that provide:

x rapid deployment and establishing communication as well as proper operation of ICT networks;

(7)

x dynamic reconfiguration of used systems and networks in the event of damage or destruction of the ICT infrastructure;

x automatic exchange of databases between the parts of the safety management systems of the state;

x secure information flow.

The components of the infrastructure designed to ensure the flow of information can be built on the following elements:

x the Internet network WAN and LAN type to ensure encrypted data transmission;

x access servers with authentication of the access to the resources;

x network integrators of IP-WAN – which allowing the exchange of data via radio link and stationary lines;

x integration blocks - that allow the automatic exchange of data and voice messages between wired and wireless systems;

x subscribers' terminals;

x access stations;

x radio broadcasting centres;

x radio reception centres;

x retranslation radio transmitters;

x radio base stations;

x broadband radio stations;

x personal radio stations;

x IP radio stations;

x directional radio links;

x mobile phones;

x satellite phones.

Efficient flow of information between all the elements responsible for safety could reduce to a minimum the time for developing a decision and for rapid action which could support increasing the level of security of the state in crisis situations.

Therefore, ICT systems, which are used for the collection, processing, transmission and storage of information for national security, must be protected adequately and be secured against unauthorized access, modification, or obtaining information by unauthorized persons.

5. Conclusions

The use of information protection measures in ICT systems should guarantee confidentiality, integrity and continuous availability and access to stored data only by authorized persons. Limited access to sources of information may delay the decision making process and thus lead to the spread of risks. In order to avoid such situations should be necessary to introduce measures of efficient protection in order to guarantee the security of information as well as quick access to it. Such actions should limit opportunities for access to the important data for national security by unauthorized persons, as well as to make the unauthorized changes in the databases or protect systems from deliberate destruction of information. Only professionally designed electronic systems and properly constructed IT security policy could ensure the proper protection of information and enable the efficient functioning of the state in case of the threat for state's critical infrastructure. Well- designed information security policy should contain documented sets of rules, best practices and procedures, in which the organisation determines how to protect their assets, own systems and processed information [7].

Currently every country tries to protect their ICT systems. In case of Poland such provisions were determined in "Cyberspace Security Policy of the Republic of Poland", which defined that with special protection should embraced ICT systems that are operated by the government, the legislative authorities, the judiciary, local government, the strategic state safety systems as well as businessmen and individuals [8].

Conducting the well-organized and coherent IT security policy requires formulation of a legal and organizational framework in order to build a system of effective coordination and information exchange between all elements of national security management system and enable collaboration within the framework of international agreements. Only a coherent

99

(8)

system could provide the efficient exchange of information and effective management in case of extraordinary emergency situations.

Providing of the required level of ICT

security should also ensure the protection and defence of country’s critical infrastructure.

References [1] https://www.europol.europa.eu/ec3

[2] http://www.enisa.europa.eu/

[3] http://www.cert.org/

[4] https://www.csirt.org/

[5] http://www.interpol.int/

[6] https://ccdcoe.org/

[7] PN-ISO/IEC 27002:2014-12

[8] Cyberspace Protection Policy of the Republic of Poland, Warsaw 2013.

Cytaty

Powiązane dokumenty

Krem ze świeżych pomidorów z kleksem śmietany 14 zł/os.. Krem z zielonego groszku z bekonowym chipsem

Jeśli z pięciu punktów danych tylko trzy leżą na jednej pro- stej, wtedy przez nie można poprowadzić tylko jedną krzywą drugie- go stopnia, ale zwyrodniałą, którą będą w

Ale skoro nadszedł wrzesień to wraz z nim rozpoczęli naukę w naszej szkole nowi uczniowie (jeszcze chyba tak do końca nie świadomi, w co się pakują, ) Co ich

58 ustawy o przeciwdziałaniu narkomanii osoba, która udziela innej osobie narkotyków, ułatwia albo umożliwia ich użycia albo nakłania do ich użycia podlega karze

Szlifierka pneumatyczna RUKO posiada gumową, antypoślizgową rączkę, która tłumi wibracje i chroni przed wyślizgnięciem się użytkownikowi podczas pracy!. Liczbę obrotów

Cel: Grupa/zespół dowiaduje się czym jest proces empiryczny i jak się on ma do Scruma. Pokazanie podstawowych filarów procesu empirycznego: inspekcja, adaptacja

Uniwersy- tetu Śląskiego 2021 [plik tekstowy PDF: 4,35 MB], seria „Prace Naukowe Uniwersytetu Śląskiego w Katowicach”, nr 4044.. Kisiel

The solid carbide end mill with polished rake face and reinforced core for machining with large allowances and at medium cutting speeds. The geometry of the face