Author
Listed:
- Marta Chodyka
- Slawomir Zurawski
- Sylwia Wojciechowska-Filipek
- Zbigniew Ciekanowski
- Slawomir Mazur
Abstract
Purpose: This article analyses contemporary cyber threats against critical infrastructure and identifies effective strategies for managing its security under conditions of increasing digitisation. The study focuses on assessing the impact of attacks on the energy, transportation, water supply, and healthcare sectors and identifying institutional and legislative measures to strengthen the resilience of these systems. Research Methodology/Approach: The paper uses theoretical methods, including literature analysis, cybersecurity industry reports and case studies of selected incidents that affected critical infrastructure in 2023-2025. The first part characterises the main types of cyber attacks (ransomware, DDoS, APT) and the sectors most vulnerable to disruption. This follows an analysis of the consequences of selected attacks on state and private infrastructure operations. The final section presents a systemic approach to security management, including the concepts of resilience, redundancy, business continuity and legislative solutions such as the NIS2 directive and national infrastructure protection programs. The research problem was formulated: What cyber threats pose the most significant challenge to critical infrastructure security, and what strategies can ensure adequate protection? The hypothesis is that effective protection of critical infrastructure requires integrated actions based on technology, regulation and cross-sector and international coordination. Results: The conclusions of the analysis indicate that critical infrastructure remains one of the most common targets of cyberattacks, and their effects are often cascading and cross-border. Protecting these assets requires a systems approach that combines threat detection technologies, business continuity planning, collaboration between operators and security services, and regulatory alignment with the dynamically changing threat landscape. Practical implications: The findings are essential for state security institutions, critical service operators and policymakers. Adequate infrastructure protection requires technological investment and awareness-building among management and operational staff, as well as regular training, resilience testing and security audits. Lessons can be used in the design of public policies and the development of crisis management plans. Originality/Value: The article brings value by comprehensively addressing the problem of critical infrastructure security management in the context of growing cyber threats. It combines technological, institutional and legal analysis to formulate practical recommendations for national and international protection systems. It emphasises the need to strengthen cross-border cooperation and harmonise protection standards within structures such as the European Union and NATO.
Suggested Citation
Marta Chodyka & Slawomir Zurawski & Sylwia Wojciechowska-Filipek & Zbigniew Ciekanowski & Slawomir Mazur, 2025.
"Critical Infrastructure Security Management in the Era of Cyber Threats,"
European Research Studies Journal, European Research Studies Journal, vol. 0(2), pages 610-621.
Handle:
RePEc:ers:journl:v:xxviii:y:2025:i:2:p:610-621
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ers:journl:v:xxviii:y:2025:i:2:p:610-621. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Marios Agiomavritis (email available below). General contact details of provider: https://ersj.eu/ .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.