Cross-CI Assessment of Risks and Cascading Effects in ATLANTIS Project
Abstract
1. Introduction
2. Approach and Methods Used
2.1. Risk Assessment
- 1 (low priority): The category has minimal influence on risk mitigation decisions.
- 2 (moderate priority): The category is important but balanced with other high-priority factors.
- 3 (high priority): This category is a critical factor in risk mitigation; failure would have severe implications on the business process.
- <25%: Low Risk
- 25–50%: Medium Risk
- 50–75%: High Risk
- >75%: Critical Risk
2.2. ATLANTIS Architecture
- Components: Building blocks of the system, including software modules, hardware devices, and network components.
- Relationships: Connections and interactions between components, such as data flow, control flow, and communication protocols.
- Dependencies: Relationships between components that define their order of execution or operation.
- Processes: Activities or operations performed by the system, including data processing, communication, and control.
- Layer 1 is the CI-specific Incident Detection System (IDS) or civilian Command, Control, Communications, Computers, and Intelligence (C4I) systems. It is responsible for CI-specific information gathering and CI observation, including physical (i.e., hazard/threat-specific sensors, video surveillance, drones), cyber (e.g., complex data from PLC, SCADA, IDC, and network connectivity systems), and Humans in Vicinity (HiVIC) as human sensors.
- Layer 2 is responsible for local incidents processing, systemic risks pattern extraction, situational awareness, threats prediction/early-detection, and automatic countermeasures enforcement.
- Layer 3 is a federated cross-CI collaborative Knowledge sharing platform, Risk Assessment, State Awareness and Incidents Mitigation (CCI-SAAM) among collaborative cross-border and cross-domain CIs.
3. Results
3.1. Application in ATLANTIS
3.2. Validation Approach
3.3. Example
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
ATLANTIS | Improved resilience of Critical Infrastructures AgainsT LArge scale transNational and sysTemic rISks |
CCI-SAAM | Cross-CI Sharing Assessment Analysis Mitigation |
CER | Critical Entities Resilience |
CI | Critical Infrastructure |
CIP | Critical Infrastructure Protection |
CPH | Cyber-Physical-Human |
DT | Digital Twin |
ECI | European Critical Infrastructure |
EU | European Union |
IDS | Intrusion Detection System |
LSP | Large Scale Pilot |
NaTech | Natural hazard triggered a technological accident |
THO | Technology-Human-Organisational |
References
- European Commission. Communication from the Commission on the EU Security Union Strategy. COM(2020) 605 Final, 24 July 2020. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:52020DC0605 (accessed on 16 January 2025).
- Directive (EU) 2022/2557 of the European Parliament and of the Council of 14 December 2022 on the Resilience of Critical Entities and Repealing Council Directive 2008/114/EC. Available online: https://eur-lex.europa.eu/eli/dir/2022/2557/oj (accessed on 16 January 2025).
- Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on Measures for a High Common Level of Cybersecurity Across the Union, Amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and Repealing Directive (EU) 2016/1148 (NIS 2 Directive). Available online: https://eur-lex.europa.eu/eli/dir/2022/2555/2022-12-27 (accessed on 2 September 2025).
- ENISA Cybersecurity Threat Landscape Methodology. European Union Agency for Cybersecurity. Publication Date: 1 August 2025. Available online: https://www.enisa.europa.eu/publications/enisa-cybersecurity-threat-landscape-methodology (accessed on 2 September 2025).
- Ouyang, M. Review on modelling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 2014, 121, 43–60. [Google Scholar] [CrossRef]
- Ji, A.; He, R.; Chen, W.; Zhang, L. Computational methodologies for critical infrastructure resilience modeling: A review. Adv. Eng. Inform. 2024, 62, 102663. [Google Scholar] [CrossRef]
- Kim, Y.; Chen, Y.; Linderman, K. Supply network disruption and resilience: A network structural perspective. J. Oper. Manag. 2015, 33–34, 43–59. [Google Scholar] [CrossRef]
- Lampropoulos, G.; Larrucea, X.; Colomo-Palacios, R. Digital Twins in Critical Infrastructure. Information 2024, 15, 454. [Google Scholar] [CrossRef]
- Gordan, M.; Kountche, D.A.; McCrum, D.; Schauer, S.; König, S.; Delannoy, S.; Connolly, L.; Iacob, M.; Durante, N.G.; Shekhawat, Y.; et al. Protecting critical infrastructure against cascading effects: The PRECINCT approach. Resilient Cities Struct. 2024, 3, 1–19. [Google Scholar] [CrossRef]
- Šarūnienė, I.; Martišauskas, L.; Krikštolaitis, R.; Augutis, J.; Setola, R. Risk assessment of critical infrastructures: A methodology based on criticality of infrastructure elements. Reliab. Eng. Syst. Saf. 2024, 243, 109797. [Google Scholar] [CrossRef]
- EU H2020 project SmartResilience (Smart Resilience Indicators for Smart Critical Infrastructures). Available online: https://cordis.europa.eu/project/id/700621 (accessed on 20 January 2025).
- EU H2020 Project InfraStress (Improving Resilience of Sensitive Industrial Plants & Infrastructures Exposed to Cyber-Physical Threats, by Means of an Open Testbed Stress-Testing System). Available online: https://cordis.europa.eu/project/id/833088 (accessed on 20 January 2025).
- EU H2020 Project DEFENDER (Defending the European Energy Infrastructures). Available online: https://cordis.europa.eu/project/id/740898 (accessed on 21 January 2025).
- EU H2020 Project 7SHIELD (Safety and Security Standards of Space Systems, Ground Segments and Satellite Data Assets, via Prevention, Detection, Response and Mitigation of Physical and Cyber Threats). Available online: https://cordis.europa.eu/project/id/883284 (accessed on 20 January 2025).
- EU Horizon Europe Project PRECINCT (Preparedness and Resilience Enforcement for Critical INfrastructure Cascading Cyberphysical Threats and Effects with Focus on District or Regional Protection). Available online: https://cordis.europa.eu/project/id/101021668 (accessed on 20 January 2025).
- EU Horizon Europe Project Atlantis (Improved Resilience of Critical Infrastructures AgainsT LArge Scale transNational and sysTemic rISks). Available online: https://cordis.europa.eu/project/id/101073909 (accessed on 20 January 2025).
- Standard ISO 31000:2018 Risk Management—Guidelines. Available online: https://www.iso.org/standard/65694.html (accessed on 20 January 2025).
- Guidelines for Chemical Process Quantitative Risk Analysis, 2nd ed.; Center for Chemical Process Safety; Wiley-AIChE: New York, NY, USA, 2000; ISBN 0-8169-0720-X.
- Guidelines for Analyzing and Managing the Security Vulnerabilities of Fixed Chemical Sites; American Institute of Chemical Engineers: New York, NY, USA, 2010; ISBN 978-0-470-92500-3.
- Gerbec, M.; Giunta, G. InfraStress approach on risk modelling of cascading events with live data for decision support. In Cyber-Physical Threat Intelligence for Critical Infrastructures Security: Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry; Soldatos, J., Praça, I., Jovanović, A., Eds.; NowOpen: Hanover, Germany, 2021; pp. 2–21. [Google Scholar] [CrossRef]
- Standard ISO 14224:2016; Petroleum, Petrochemical and Natural Gas Industries—Collection and Exchange of Reliability and Maintenance Data for Equipment. Available online: https://www.iso.org/standard/64076.html (accessed on 20 January 2025).
- Rinaldi, M.; Peerenboom, J.P.; Kelly, T. Identifying, understanding and analysing crit-ical infrastructure interdependencies. IEEE Control Syst. Mag. 2001, 21, 11–25. [Google Scholar] [CrossRef]
- Faisal, K.; Rathnayaka, S.; Salim, A. Methods and models in process safety and risk management: Past, present and future. Process Saf. Environ. Prot. 2015, 98, 116–147. [Google Scholar] [CrossRef]
- Suarez, P.M.C.; Perreur, M.; Munoz, F.; Cruz, A.M. Systematic literature review and qualitative meta-analysis of Natech research in the past four decades. Saf. Sci. 2019, 116, 58–77. [Google Scholar] [CrossRef]
- Krausmann, E.; Cruz, A.M.; Salzano, E. (Eds.) Natech Risk Assessment and Management Reducing the Risk of Natural-Hazard Impact on Hazardous Installations; Elsevier: Amsterdam, The Netherlands, 2017; ISBN 978-0-12-803807-9. [Google Scholar]
- EC; JRC; Institute for the Protection and Security of the Citizen. Understanding Malicious Attacks Against Infrastructures Overview on the Assessment and Management of Threats and Attacks to Industrial Control Systems. Bogdan Vamanu, Marcelo Masera. EUR 23681 EN. 2008. Available online: https://publications.jrc.ec.europa.eu/repository/bitstream/JRC49474/understanding%20malicious%20attacks%20against%20infrastructures.pdf (accessed on 20 January 2025).
- ENISA Report on Threats in the Area of Smart Grids and Good Practice Guide. 17 December 2013. Available online: https://www.enisa.europa.eu/sites/default/files/publications/Smart%20Grid%20Threat%20Lanscape.pdf (accessed on 20 January 2025).
- Kavanagh, C. New Tech, New Threats, and New Governance Challenges: An Opportunity to Craft Smarter Responses? Carnegie Endowment for International Peace. 2019. Available online: https://carnegieendowment.org/files/WP_Camino_Kavanagh___New_Tech_New_Threats1.pdf (accessed on 20 January 2025).
- Regulation (EU) 2019/452 of the European Parliament and of the Council of 19 March 2019 Establishing a Framework for the Screening of Foreign Direct Investments into the Union. Available online: https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32019R0452&from=EN (accessed on 20 January 2025).
- European Commission. Study on the EU’s List of Critical Raw Materials–Final Report; European Commission: Brussels, Belgium, 2020; ISBN 978-92-76-21049-8. [Google Scholar] [CrossRef]
- Bennett Brian, T. Understanding, Assessing, and Responding to Terrorism Protecting Critical Infrastructure and Personnel; Wiley: Hoboken, NJ, USA, 2017; ISBN 978-1-119-23781-5. [Google Scholar]
- Scrum Guides. Available online: https://scrumguides.org/index.html (accessed on 20 January 2025).
Type | Description |
---|---|
Physical | The state of an asset depends on the physical output of another asset. |
Cyber | The state of an asset depends on the information/data that is transmitted through cyber systems by another asset. |
Geographical | The state of an asset might be affected by another asset due to their geographical proximity, making them vulnerable to the same environmental or physical threat. |
Logical | Interdependencies via a mechanism that is not of a physical, cyber, or logical nature (e.g., a disruption of the public transport system might lead to congestion in other modes of transportation). |
Functional | Operational linkages where the functioning of one asset is necessary for the functioning of another (e.g., emergency response operations depend functionally on both communication and transport systems). |
Policy | Arises when legal, regulatory, or policy decisions in one sector impact others (e.g., a change in energy policy can trigger a change in oil prices). |
Shared | Assets share common resources or components. |
Economic | Arises when financial or market-based influences in one sector impact another (e.g., a spike in fuel costs affects transportation costs). |
Threat/Hazard Category | Brief Description and References |
---|---|
Technology-Human-Organisational (THO) | Unintentional industrial site failures due to human error, technological faults, or hazardous substance releases. May include nuclear and radiological events [23]. |
NaTech and climate-related | Natural hazards (e.g., floods) that trigger failures in CI due to weakness in THO measures. Also includes extreme weather phenomena linked to climate change [24,25]. |
Physical attack | Intentional human-caused disruption, such as unauthorised access or direct attacks on CI sites (e.g., terrorist attack, sabotage) [26]. |
Cyber-attack | Malicious cyber intrusions or conditions that lead to asset loss or operational failures, including hacking, malware, data breaches, and system disruptions [27]. |
Technology trends related | Emerging disruptive technologies that could create vulnerabilities or security concerns within CI systems [28]. |
Foreign Direct Investments (FDI) | Security risks associated with foreign ownership or investment in CI, including potential denial of access, espionage, and technology leakage [29]. |
Critical supplies (non-EU) | Risks related to supply chain dependencies on non-EU countries, potentially causing disruptions in essential materials, technology, or expertise [30]. |
Impact Category | Score and Criteria |
---|---|
1. People Exposed: The number of individuals affected. | 0: None exposed. 1: 1–50 people exposed. 2: 51–250 people exposed. 3: 251–1000 people exposed. 4: 1001+ people exposed. |
2. Economic Impact (Repair or replacement costs): The financial burden of restoring services. | 0: No significant economic effect. 1: Restoring cost is less than 250,000 €. 2: Restoring cost is between 250,000 and 1,000,000 € 3: Restoring cost is between 1,000,000 and 10,000,000 €. 4: Restoring cost is greater than 10,000,000 €. |
3. Economic Impact (Contribution to the economy): Wider economic consequences. | 0: No significant economic effect. 1: Impact on the individual critical asset’s profitability is <10%. 2: Impact on the organisation’s profitability is >10%. 3: Impact on the regional economy. 4: Impact on the national economy. |
4. Business or Service Interruption: Duration and severity of operational downtime. | 0: Critical assets could operate with minimal operational changes or repair. 1: Critical assets could partially operate. 2: Critical asset is shut down or unable to operate for <6 months. 3: Critical asset is shut down or unable to operate for >6 months. 4: Critical asset is not expected to be restored. |
5. Interdependencies: Effects on interconnected infrastructure. | 0: No effect on the critical asset’s normal operations. 1: Critical asset is a stand-alone facility and is not interdependent on other assets; adverse effects would not extend beyond this single asset. 2: Critical asset is part of a larger system; however, adverse effects would not extend beyond this single asset 3: Critical asset is part of a larger system, and at least one other asset depends on its outputs. 4: Critical asset is part of a larger system, and many other assets depend on its outputs. |
6. Criticality: The importance of the asset in maintaining essential services. | 0: No adverse effect. 1: Minor adverse effects would occur, limited to a local environment. 2: Significant adverse effects would occur, limited to the local environment 3: Significant adverse effects would occur in the broader environment. 4: Significant adverse effects would occur nationally or worldwide. |
7. Environmental Impact: Potential damage to water, air, soil, and biodiversity. | 0: None. 1: Limited damage. 2: Short-term damage to a limited extension of the surrounding environment. 3: Long-term damage to a limited extension of the surrounding environment or short-term damage to a significant extension of the surrounding environment. 4: Permanent or long-term damage to a significant extension of the surrounding environment. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gerbec, M.; Čaleta, D.; Modic, J.; Giunta, G.; Durante, N.G. Cross-CI Assessment of Risks and Cascading Effects in ATLANTIS Project. Appl. Sci. 2025, 15, 10374. https://doi.org/10.3390/app151910374
Gerbec M, Čaleta D, Modic J, Giunta G, Durante NG. Cross-CI Assessment of Risks and Cascading Effects in ATLANTIS Project. Applied Sciences. 2025; 15(19):10374. https://doi.org/10.3390/app151910374
Chicago/Turabian StyleGerbec, Marko, Denis Čaleta, Jolanda Modic, Gabriele Giunta, and Nicola Gregorio Durante. 2025. "Cross-CI Assessment of Risks and Cascading Effects in ATLANTIS Project" Applied Sciences 15, no. 19: 10374. https://doi.org/10.3390/app151910374
APA StyleGerbec, M., Čaleta, D., Modic, J., Giunta, G., & Durante, N. G. (2025). Cross-CI Assessment of Risks and Cascading Effects in ATLANTIS Project. Applied Sciences, 15(19), 10374. https://doi.org/10.3390/app151910374