Page 128 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 128
SECTION II: CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION
5 Conclusion
Critical infrastructures, in their regular functioning, depend significantly on the support of
information systems. At a time of intensive development of information and communica-
tion technologies, it is almost unthinkable to fulfil the key functions of critical infrastructure
without the significant role of information technologies, especially in the field of their protec-
tion. The day-to-day development of new technological advances in the field of information
and communication technologies, in addition to significantly contributing to the functionality
and protection of critical infrastructure, also opens up numerous opportunities for the misuse
of technologies, which can consequently impair the stability of systems and in some cases
bring about their destruction. By analyzing the terrorist threat and possible consequences of
a cyberterrorism attack on critical infrastructure, it can be concluded that the consequences
of such an attack could have far more severe and lasting effects on critical infrastructure than
other forms of terrorist threat.
It is for this reason that the two security phenomena (i.e. terrorist threats and a cyberterrorism
attack on critical infrastructure) need to be more closely linked, both at the policy level and
at the operational level of cooperation of the competent authorities in the implementation of
critical infrastructure protection and the fight against terrorism.
In order to show the current level of protection, from the very development of the policy docu-
ment right up to its implementation on the ground, we have taken the example of the European
Union and the Republic of Croatia. Through our research, we have been able to demonstrate
that there is a disproportion between the development of security policies for the protection
of critical infrastructure and their implementation in practice. Our recommendations urge an
even more reliable and robust strategic and normative framework for critical infrastructure
protection, in which cyber threats, including cyberterrorism, are more emphasized. Next, we
believe that more space should be devoted to developing guidance from strategic and nor-
mative documents through implementation guidance to actors in the critical infrastructure
protection process with clear responsibilities and competencies and a coordinating role in
these processes. Our third recommendation goes towards the need for more comprehensive
and better coordination and cooperation between the operational elements of the implementa-
tion of critical infrastructure protection – from the EU level to all countries of interest in this
research – because if most stakeholders in these processes are aware of the need for critical
infrastructure protection, the above should be proactively implemented and thus the system
and its procedures will be developed through a bottom-up approach.
128