Page 138 - Cyber Terrorism and Extremism as Threat to Critical Infrastructure Protection
P. 138

SECTION II:  CYBER TERRORISM AND SECURITY IMPLICATION FOR CRITICAL INFRASTRUCTURE PROTECTION

        Frameworks generally offer taxonomies of critical infrastructures, procedures for identifying
        and designating them, and the codification of the responsibilities of the CI owner/operator ,
        such as the drafting of Operator Security Plans to be reviewed regularly or whenever the situ-
        ation warrants it, and the designation of competent authorities for each CI sector and of an
        overall coordinating authority.

        Most owners and operators of Critical Infrastructure in the West are private companies (from
        around 75% in the EU to 85% in the US) and this leads to significant challenges, including
        of coordination. An added dimension of the challenge stems from the foreign ownership and
        operation of certain critical infrastructures. The highest management levels of these particu-
        lar organizations are located in other countries, with the attendant complexity with regard to
        disinvestment, lack of investment in security processes, lack of bargaining power on the part
        of smaller states, limited tools for inducing changes in behaviour, and so on. In addition to
        operational and governance issues of CIP, there may also be geopolitical considerations.

        As stated above and by Helbing (2013), a great deal of critical infrastructure is networked
        regionally and even globally, and therefore surpasses the ability of the authorities of a single
        jurisdiction to govern. Even if all jurisdictions feature CIP processes, the lack of coordina-
        tion or compatibility may lead to new risks, vulnerabilities and threats appearing in the gaps,
        especially as adversaries seek to take advantage of the situation and exploit differences in
        governance and in relative preparedness. This is why there are more and more global initia-
        tives directed towards governing systemic issues, such as cyber dependencies, global trade
        infrastructure and technological standardization for inter-operability.

        The EU, however, has built a European Programme for Critical Infrastructure Protection (EP-
        CIP), starting with a series of documents of reference such as Directive 114/2008. While
        defining best practice for national systems, the European system concerns itself with Critical
        European Infrastructures, managed in concert with the national authorities and defined as an
        “asset, system or part thereof located in Member States which is essential for the maintenance
        of vital societal functions, health, safety, security, economic or social well-being of people,
        and the disruption or destruction of which would have a significant impact in a Member State
        as a result of the failure to maintain those functions” (Council Directive 2008/114/EC of 8
        December 2008 on the identification and designation of European critical infrastructures and
        the assessment of the need to improve their protection, 2008). This recognizes the effects of
        the intended integration of the EU’s Member States into an “ever closer Union”, especially
        projects such as the “Energy Union”, the “Single Digital Market” and the strategic transport
        corridors. As we will see in the final section of this paper, this presents opportunities for the
        CI governance of SEE nations not in the EU.



        3  The Cyber Perspective on CIP and Terrorism

        It is important to note that cyber environment does not only designate the ITC critical infra-
        structure category, but is also a cross-cutting issue, since cyber has become a medium for
        command, control, coordination and information gathering processes at the level of complex
        systems of systems (Georgescu & Cîrnu, 2019). Building on the CIP section of this article,
        we may say that the efficiencies in the operation of critical infrastructure which enable higher
        productivity and functionality have been purchased at the cost of the permeation of cyber


       138
   133   134   135   136   137   138   139   140   141   142   143