Page 128 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 128

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        5  Conclusion

        Critical infrastructures, in their regular functioning, depend significantly on the support of
        information systems. At a time of intensive development of information and communica-
        tion technologies, it is almost unthinkable to fulfil the key functions of critical infrastructure
        without the significant role of information technologies, especially in the field of their protec-
        tion. The day-to-day development of new technological advances in the field of information
        and communication technologies, in addition to significantly contributing to the functionality
        and protection of critical infrastructure, also opens up numerous opportunities for the misuse
        of technologies, which can consequently impair the stability of systems and in some cases
        bring about their destruction. By analyzing the terrorist threat and possible consequences of
        a cyberterrorism attack on critical infrastructure, it can be concluded that the consequences
        of such an attack could have far more severe and lasting effects on critical infrastructure than
        other forms of terrorist threat.

        It is for this reason that the two security phenomena (i.e. terrorist threats and a cyberterrorism
        attack on critical infrastructure) need to be more closely linked, both at the policy level and
        at the operational level of cooperation of the competent authorities in the implementation of
        critical infrastructure protection and the fight against terrorism.

        In order to show the current level of protection, from the very development of the policy docu-
        ment right up to its implementation on the ground, we have taken the example of the European
        Union and the Republic of Croatia. Through our research, we have been able to demonstrate
        that there is a disproportion between the development of security policies for the protection
        of critical infrastructure and their implementation in practice. Our recommendations urge an
        even more reliable and robust strategic and normative framework for critical infrastructure
        protection, in which cyber threats, including cyberterrorism, are more emphasized. Next, we
        believe that more space should be devoted to developing guidance from strategic and nor-
        mative documents through implementation guidance to actors in the critical infrastructure
        protection process with clear responsibilities and competencies and a coordinating role in
        these processes. Our third recommendation goes towards the need for more comprehensive
        and better coordination and cooperation between the operational elements of the implementa-
        tion of critical infrastructure protection – from the EU level to all countries of interest in this
        research – because if most stakeholders in these processes are aware of the need for critical
        infrastructure protection, the above should be proactively implemented and thus the system
        and its procedures will be developed through a bottom-up approach.




















       128
   123   124   125   126   127   128   129   130   131   132   133