Microsoft Word - Issue-4.docx 38 Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise Dorel Badea Department of Management, Faculty of Military Management "Nicolae Balcescu" Land Forces Academy of Sibiu Revolutiei Street no. 3-5, 550170, Sibiu, Romania Phone: 0269432990 dorel.badea@yahoo.com Marin-Marian Coman Military Training Center "Nicolae Balcescu" Land Forces Academy of Sibiu Revolutiei Street no. 3-5, 550170, Sibiu, Romania Phone: 0269432990 coman.marian@gmail.com Dumitru Iancu Department of Management, Faculty of Military Management "Nicolae Balcescu" Land Forces Academy of Sibiu Revolutiei Street no. 3-5, 550170, Sibiu, Romania Phone: 0269432990 dorin_dan@yahoo.com Olga Bucoveţchi Department of Economic Engineering, Faculty of Entrepreneurship, Business Engineering and Management University “Politehnica” of Bucharest Splaiul Independenței 313, 060042, Bucharest, Romania Phone: 0214029100 olga.bucovetchi@upb.ro Abstract The linearity of processes is no longer valid only for strictly defined intervals, the decision- makers being forced to explore and exploit other sources and options for imposing a predicted management order in accordance with standards, procedures, policies, etc. Given the socio-technical particularities of organizations that own or manage critical infrastructures with direct implications for risk management activities, it is necessary to conduct theoretical and practical actions for testing their sensitivity by taking in consideration the variation of external factors (geo-climacterics, politics, military, economic factors, etc.) for verifying and validating the decisional variants structured at the operational management level. No matter the level of organizational maturity, the possible solutions for achieving this goal must be optimal from the point of view of the cost-effectiveness ratio and, in the same time, they should converge to a paradigmatic potential for valorizing in a timely and judicious manner the most important component of the organizational capability - the human resource. In this context, the education for sustainability becomes the objective function that needs to be optimized. As a methodological framework for learning and internalizing the procedures that should become an operating standard, the conceptual modeling and simulation are very well suited and the serious games can be chosen as an implementation tool. Therefore, the military organization has been selected as a model of good practice where the training is conducted through simulation and wargaming. When we should analyze the acquisition process of knowledge, the military organization is the proper choice because it offers a series of advantages by the way of transforming the real situation into elements of simulation and by an easy transfer of the gained experience into the real context. Keywords: Critical Infrastructure, Security, Wargame, Knowledge. D. Badea , M.-M. Coman, D. Iancu, O. Bucoveţchi - Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise 39 1. Introduction The design of a research direction for this article, having as a framework the relationship between society, infrastructure, security and sustainability, has among arguments the Cohen approach (2010), who considers critical infrastructures to be something that people depend on, in a direct or indirect manner, at any time, in terms of life and welfare. Unlike this approach, the definitions of critical infrastructure given by different sources from the EU area, refer to the fact that it means an element, a system or a system's component, located within the territory of the Member States that is essential for the preservation of vital societal functions, health, safety, security, social or economic well-being of individuals, and whose disruption or destruction would have a significant impact in a Member State due to the inability to maintain those functions (*** Directive 114/2008). Therefore, ensuring the resilience of the society (understood as a meta-system) is a subject of the utmost importance and actuality for military, civil, public or private organizations (Walker, Cooper, 2011). More than ever, in a non-exhaustive enumeration, concepts such as the Internet of Things, Cybernetics, Process Continuity, Block Chains, and Industry 4.0 are leading the organizations to reconsider the ways to move to higher levels of maturity in terms of sustainability. Based on the complexity, nonlinearity and dynamics of the component structures it is a fact that the relations between the constituent elements are not fully and correctly identified. On the background of the existence of a certain pretension, caused by the manifestation of the gap between the vision of the future and the understanding of current reality, it is more and more obvious that in the knowledge society, the improvement or redesign of critical infrastructure performance (related to the private domain and especially to the public domain) is indissolubly linked to the improvement of the specific information processes' functionality (Denyer, 2017). Taking into consideration the proposed paper's title, the above-mentioned thesis involves fundamental aspects specific to the reaction of organizations to environmental demands, such as: the use of unequivocally specialized vocabulary, the identification of good practices and development methods, the design of appropriate security governance metrics, and last but not least, accountability to ensure critical infrastructure security. In this thematic register, as a basis for providing solid premises to generate added security, the customization of specific elements (common values, competencies, behavior, personnel) comprised in a specialized tool that has a wide applicability in the field of organizational redesign (ex. the McKinsey 7-S model) leads to the necessity of condition fulfilling which is related to the operationalization of an adequate knowledge within holding organizations of critical infrastructure. It is essential to relate to the differences between knowing and knowledge, as already they were assumed in the literature: “Knowledge is the result of a knowing process at one point. It can be generated, structured and transformed from a form into another form, in a continuous process. Knowledge is a complex combination of conscious and unconscious, rational and irrational, direct experience of life and knowing the life, and the experience mediated in the process of learning.” (Brătianu, 2015, p. 28). Useful supplements in this direction are included in the Dictionary of Management as a reference work to demonstrate the level of theoretical and practical development of this discipline at the national level (Nicolescu, 2011). After presenting knowledge as assemblies of applicable information and abilities generated by the receiver following the use of information, which has the capacity to generate added value by using them, the two components namely the human and the economic dimension are emphasized. In accordance with the research objectives of this paper, the explanation given to the human dimension of knowledge draws attention. In this regard, it is emphasized the fact that a certain information to a particular person with a certain type of training and skills is used appropriately and generates added value, and the same information is only a simple information to a less competent person. The issue of resources committed to generating paradigmatic value knowledge is in no way devoid of importance. The problem has mild contradictory aspects in the public sector, where, under specific budget constraints, a certain level of performance is required involving computer network-based technical solutions, using a specialized software, training, generically combined under an e-administration dome or even e-government. All this means a large amount of financial BRAIN – Broad Research in Artificial Intelligence and Neuroscience Volume 9, Issue 4 (November, 2018), ISSN 2067-3957 40 resources for the creation of such administrative infrastructure. Assuming an optimal dimensioned budget allocation, the starting point to be achieved as a fundamental criterion is the professionalization of the human resource. In this regard, the use of expert systems or specialized IT technologies raises the cost of knowledge, which should take into account the imperative of human presence and the minimum skills needed to set up adequate inputs to the learning objectives, with further influences on outputs and outcomes. In this context the mixed solutions seem to be the most desirable for the use and implementation for knowledge generation and knowledge transfer processes (Paiano, Caione, & Guido, 2015). In the sense of the conceptual approach mentioned above, the mixed solutions leave a sufficient and flexible actionable freedom, both for the object of the training and for the ways of using the tools in different situations from the point of view of the complexity of the replicated aspects of reality (Figure 1). In such a context, the organizational learning takes new valences (Treapat, Gheorghiu, 2017), in the sense that it is internalized through employees, but it is not simply a sum of individual learning outcomes, becoming an essential process for adaptability to the requirements of the macroeconomic environment. Figure 1. Connections between types of knowledge and the use of gaming concept. (source: A Compendium of Wargaming Terms (Updated 7 July 2015) Compiled by William L. Simpson Jr – http://www.mors.org/Communities/CoP- Document-Search http://www.mors.org/Communities/CoP- Document-Search The Art of Wargaming by Peter Perla) The wargaming concept is recognized as a dual use tool (military and civilian purposes) with broad applicability (Figure 2) especially in the military field (it also supports the experimentations what if type). The concept itself created an entire industry (with both intensive and extensive achievements, as well as complexity and addressability), Warren Wiggins arguing in this respect: “There are multiple reasons for the use of war games; discovery, examination of concepts, and even learning. The value of the war game is to create an enabling environment to achieve the desired objective(s). The benefits of a war game are numerous; however, for the most part they provide new ways of conceptualizing the problem, new courses of action, new elements of information needed for decisions, previously unknown relationships between aspects of a problem, understanding of the problem’s dynamics.”1 An interesting addition to the use of dynamic term is the one made by The Goldsworthy, Stolk&Associates, which highlights the fact that a conflict is not solely kinetic. “Conflict is always the outcome of many societal dynamics. Acknowledging those dynamics it is crucial to ensure a realistic simulated operating environment. GS&A have applied wargaming within various contexts: ministerial, NATO, universities and civil security.”2 Finally yet importantly, it is useful to mention David Schroeder's approach that highlights the importance of wargames in both military and business environments. Given the current development conditions of the various public or private areas of activity and based mainly on IT and related vectors, the wargaming concept is applied with a strong tradition of use in the military field (there is already a wargaming book edited in 2017 by the UK MoD that has the role to be a reference guide for all practitioners - Wargaming Handbook, and a dedicated annual conference - Connections US Wargaming 1 https://www.csiac.org/wp-content/uploads/2016/12/CSIAC_Journal_V4N3_Nov2016.pdf 2 https://www.goldsworthy-stolk-associates.com/?lightbox=dataItem-j66ficzt D. Badea , M.-M. Coman, D. Iancu, O. Bucoveţchi - Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise 41 Conference). Thus, it could be argued that the applied wargaming as a "discipline" is still in a full maturity process, there being no consensus between different specialists (military, security, education, and human resources experts, psychologists, sociologists, software development engineers, etc.) on the main directions to be investigated and the proper ways of better implementation of the results at the organizations level. Taking into consideration the general way of developing a working terminology, regardless of the type used (education, training and analytics), the wargaming is a component of the decision making process done under conditions of uncertainty, that generate the courses of actions (decisional variants) which are analyzed in the context of an emerging situation. This situation is based on a tailored scenario of which the participants are aware, that is applied sequentially and managed in a logical succession, based on the rules known by all participants. Figure 2. Ways to conceptualize wargaming in the military and IT business field. (sources: https://www.goldsworthy-stolk-associates.com/?lightbox=dataItem-j66ficzt; http://professionalwargaming.co.uk/ConnectionsKeynote.pdf) The training exercise, which took place in 2017 in the USA called "Navy Private Sector Critical Infrastructure War Game" is an eloquent example of good practice in field of critical infrastructure. The exercise has been conducted by involving a number of 125 players from 14 critical infrastructure sectors, that covered a wide spectrum of representativeness from public and private field: “In our war game, the attacks that were most likely to escalate to a national security incident were those on the civilian nuclear sector and sectors that had strong linkages across the national economy. Attacks on these sectors with strong linkages within the rest of the critical infrastructure created cascading effects, many of which had life or death implications beyond the initial scope of the cyberattack. Therefore, results from the war game suggest that U.S. government resources and policies should focus on the energy, transportation, communications, water/wastewater, and nuclear sectors.”3 2. Methodology Before presenting the solution to be implemented, it is adequate to emphasize a way that shows how the practitioners should use for training a special purpose scenario. The Red Teaming Guide, edited by UK DoD highlights the idea of using the red team operational thinking way in order to provide to the training audience the support for a productive training: "The idea of using red teams has been around for a long time. Commercial enterprises, such as IBM, and government agencies such as Defence Intelligence and the Central Intelligence Agency, have long used them to reduce risks and to improve their problem solving."4 3 http://www.nwcfoundation.org/Files/Admin/Corp%20Logos/Navy- Private%20Sector%20Critical%20Infrastructure%20War%20Game%20Report%20%281%29%20%282%29 .pdf 4 https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/ 142533/20130301_red_teaming_ed2.pdf BRAIN – Broad Research in Artificial Intelligence and Neuroscience Volume 9, Issue 4 (November, 2018), ISSN 2067-3957 42 Usually, for a specific scenario map, the use of colors for mapping the symbols to denominate the type of party is common in military wargaming and terminology. Blue generally denotes own forces, red is for threat, green is often used to denote indigenous security forces and brown for other actors such as non-governmental organizations and the civilian population etc. The training events based on a proper tailored scenarios can provide knowledge and abilities to practitioners related to physical protection, cyber security, cyber and physical convergence, industrial control system, information about insider treat, standards and ways to command and control, ways to counteract, etc. All of these have as training purposes the improvement of awareness, capacities to respond, build trust communities or sharing knowledge. Typically, the training audience will follow three phases for solving the problem/the crises: diagnosis phase (key assumptions, identify and question assertions, logic mapping, information check, etc), creative phase (role playing, brainstorming, what if analysis, indicators for changes, experimentation, etc.), and challenge phase (analysis of competing hypotheses, devil's advocacy, etc.). 3. Proposed solution and problem solving steps The training event offers a framework that allows to all participants a way of working and collaborating with each other in order to apply the wargame rules for a worthwhile dialogue concerning decision-making process after reviewing case scenarios. Moreover, such a training event has to be combined or connected with other kind of training events to maximize the reach of training objectives linked to value-based decision making. Eubella Alert is a fictitious scenario that has an imaginary situation in an imaginary setting with all other aspects being invented to achieve the exercise objectives and training objectives. The scenario is based on a major event - a cyberattack on an energetic control system, which can affect the majority of the critical infrastructure sectors. In addition, the scenario is enriched with a physical break of security (bomb threat) at an important nuclear plant belonging to a country that is part of a union, which has promulgated a common security policy regarding the energy sector. The GOLDEN UNION (GU) located in the central EUBELLA continent has been founded in 1992 (Figure no. 3). GU comprises six neighboring countries (ROZY, TANNY, GREENH, YELLOWE, PURPLET, and TANA), which are parliamentary democracies and a federal governance system applies to all the political and economical voted policies related to the development of the union. On one hand, the GU has its own federal government, thus on the other hand, each constituent country has a national government that has to apply the internal policies in supporting their citizens welfare. The official language recognized by the GU federal govern is Goldish language spoken almost in majority large cities of the union. Even so, in some cities and areas from the GU countries, the population has the tendency to preserve their local habits and traditional language. The process of suburbanization and urban decentralization lead the GU citizens to have a good life. Over time, there have been popular movements for independence in some areas, the majority of them based on ethnicity issues, culture, religion, and preservation of traditional language. Three years ago, GU promoted a new energy policy, called GREENY2015-2025, which led to a GDP's growth of the union with 20% more in the last year than in the previous one. The majority of countries from GU have natural resources and their economies are emerging. GU is located on the central area of EUBELLA continent. Around the union are located other emergent countries, each of them trying to apply the balanced economic policies for developing the trading and market exchange with their neighborhood countries and with union countries. The energy systems from countries inside the EUBELLA continent is based on traditional ways of obtaining the energy, however some of them are based on nuclear energy. The traditional economic development of the region, in terms of energy system, is based mainly on the oil and natural gas import and export trading. The alternative energy solutions (solar photovoltaic energy, solar thermal energy, wind energy, biomass energy, etc.) are emerging and some of the countries have implemented standards for developing them. D. Badea , M.-M. Coman, D. Iancu, O. Bucoveţchi - Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise 43 REDIA, a large country located in the northeast area of the continent, is one of the richest countries having a large amount of crude oil and natural gas reserve. REDIA commercializes its abundant natural resources to other countries from EUBELLA continent that do not have enough natural resources to produce the desired amount of energy necessary for the industry field or residential energy for population. The transportation system for oil and natural gas is in a developing and modernization phase. The main transportation pipeline, STREAM ALPHA 1, starts from REDIASHT city, one of the largest cities from REDIA, located at 100 km away from international border with GU. Then, STREAM ALPHA 1 goes through ROZY country territory and splits to the other countries that have trade agreements with REDIA for natural gas and oil import. (see Figure 3) The last GU Resolution102, voted by the federal govern and endorsed in 2015, established a well-balanced policy regarding the trade of resources inside the union neighboring countries. Resolution102 supports the energy policy GREENY2015-2025. Moreover, after signing that important document, each country designated a maneuver brigade in order to form the Golden Union Division Army (GUDA) as a very versatile and deployable maneuvering unit along of the GU territories and international borders. Figure 3. EUBELLA ALERT wargaming scenario map After implementation of the energy policy GREENY2015-2025 and the Resolution102, all countries from GU started to cut down the amount of crude oil and natural gas import from REDIA. This fact, led to a real decrease of REDIA GDP and political frictions appeared between REDIA and GU countries. In addition, in the last 2 years, there were some sabotage events against main transportation pipeline STREAM ALPHA 1. The LIBERTY PANTHER GROUP (LPG) from GU that Figurehts for freedom of energy systems has claimed the sabotage events. Consequently, REDIA started to strengthen its defense system and military combat power by developing new weapon systems and a professional army. Many funds were invested to develop cyber security domain and a series of hybrid threat designed training exercises were conducted near international border of GU. On the other side, in the last year, ROZY country from GU had for three times emergency situations that were linked to bomb threat events against its nuclear plant located in the vicinity of DORETA city. The nuclear plant was built in 2012 near ROSIAN SEA, close to REDIA, and it assures 30% of the amount of necessary energy specific to energy system of the country. BRAIN – Broad Research in Artificial Intelligence and Neuroscience Volume 9, Issue 4 (November, 2018), ISSN 2067-3957 44 Based on the tailored wargaming scenario, the training audience will make use of symbol list in order to portray on the exercise map the following elements: infrastructures, natural events, incidents, operations, and damage/operational symbology (Table 1). Table 1. Extract (examples) from a symbol list to be used within Emergency Management process and First Responder communities at all levels of need (sources: Symbology Reference, version 2.20, Released: September 14, 2005, https://www.fgdc.gov/HSWG/index.html; https://www.fgdc.gov/HSWG/ref_pages/PrintableChanges.htm) SYMBOL TYPES/ SYMBOL CLASSES SYMBOL IMAGE SYMBOL TERMS AND DEFINITIONS Infrastructures Symbology - examples (83 symbols) Agriculture and Food Infrastructure (Theme) Production and retail services of foodstuffs. Generation Stations (Energy Facilities Feature) A facility equipped with special equipment used for the production of heat or electricity. Natural Events Symbology - examples (27 symbols) Landslide (Geologic Feature) A general term for a wide variety of processes and landforms involving the down slope movement under the force of gravity of masses of soil and rock material. Flood (Hydro-Meteorologic Feature) A relatively high stream flow that overtops the stream banks in any part of its course, covering land that is not normally under water; condition that occurs when water overflows the natural or artificial confines of a stream or other body of water, or accumulates by drainage over low-lying areas. Incidents Symbology - examples (50 symbols) Civil Displaced Population (Civil Disturbance Feature) Persons or groups of person who have been forced or obliged to flee or to leave their homes or places of habitual residence, in particular as a result of or in order to avoid the effects of armed conflict, violations of human rights, or natural or human-made disasters. Criminal Activity Incident (Theme) An unlawful pursuit or action in which an individual participates. Operations Symbology - examples (46 symbols) Medical Evacuation Helicopter Station (Emergency Medical Feature) The locus of an emergency helicopter landing pad, utilized to transport severely injured persons. Health Department Facility (Emergency Medical Feature) The locus of a facility operated by a public institution which is dedicated to the promotion of health and the prevention of disease at the community, country, state, or national level. Damage/Operational Symbology - examples (10 symbols) Incident (Damage/Operational) No Levels Not Applicable Operation (Damage/Operational) Level 2 Operational, but filled to capacity or otherwise closed. After the mapping process with all the scenario symbol elements portrayed on the exercise map, the training audience can apply the ways of thinking as for Red Teaming methods for identifying and assessing the assumptions, alternative options, vulnerabilities, limitations and risks for the organization. These solving methods are suitable for reacting to a crisis, in order to take in account all unpredicted situations, deepen the critical analysis, make predictions, and develop feasible courses of action (COA) (Figure 4). D. Badea , M.-M. Coman, D. Iancu, O. Bucoveţchi - Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise 45 Figure 4. A logical way of thinking (framework) specific to a red teaming during the wargaming event (source:https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/142533/2013 0301_red_teaming_ed2.pdf) In order to run in an efficient manner the entire training with great outcomes, the training audience must put in practice the best COA to solve any unpredicted situation which could appear during the wargaming process. The teams should have to assess very well all the information received through the scenario, but usually they will try to evolve in their way of thinking and information assessing to enhance the level of awareness. Besides critical thinking for analysis of current situation and future implications, additional useful information could be provided by the role players who act in accordance with established training objectives. Doing that, the common operating picture (COP) will be clear enough for all participants and the effect will result in good countermeasures conducted in accordance with the development of the operational situation during the crisis. A better way of assessing information is by making use of the degrees of confidence specific to reliability of source and credibility of information, but they must be considered independently of each other. (table 2) As a result, a combination of letter and number will be appropriate for information assessing process. Thus, information received from a "fairly reliable" source, which is adjusted as "possibly true" will be rated as "C3". This way of analysis and thinking is very useful for training audience (Threat Assessment Team) when dealing with scenarios that emphasize an immediate crisis, like an imminent terrorist attacks in urban areas (a bomb threat in the vicinity of a crowd, a bomb placed in a critical infrastructure building) that could result in a mass casualty event. Consequently, an emergency planning response must be implemented very quickly. Table 2. Definitions of reliability of source and credibility of information (source: http://eturwg.c4i.gmu.edu/?q=node/128) Reliability of Source (designated by a letter between A and F signifying various degrees of confidence) C Fairly reliable Refers to a source which has occasionally been used in the past and upon which some degree of confidence can be based Credibility of Information (designated by a numeral between 1 and 6 signifying varying degrees of confidence) 3 Possibly true If, despite there being insufficient confirmation to establish any higher degree of likelihood, a freshly reported item of information does not conflict with the previously reported behavior pattern of the target BRAIN – Broad Research in Artificial Intelligence and Neuroscience Volume 9, Issue 4 (November, 2018), ISSN 2067-3957 46 During the wargaming conduct, a main events list-main incidents list (MEL-MIL) will be employed. The purpose of MEL-MIL is to create challenging situations for training audience in order to meet training objectives of the exercise. The incidents will be injected as the situation develops and they will follow a logical evolution of the crisis in order to enhance the training audience's COP. In this manner, all the participants have to contribute with their expertise to solve all the incidents through a collaborative work by taking all necessary countermeasures that result in an emergency response planning. The after action review (AAR) is mandatory to be conducted at the end of each wargame event. As a tool to get maximum benefit from every training session, AAR is a facilitated discussion conducted for discovering and learning what happened and why, focusing on performance standards, that actively involves the training audience in order to allow to all participants to become conscious about their gaps in training for future improvement on weaknesses or for sustaining their strengths. 4. Conclusions At the national level, there is a shortage of updated professional approach in relation to the international practice of the critical infrastructure security issue (ex. USA, Canada, Australia, Germany etc.). Although, as a declarative argument, the main idea from the official document regulating the long-term activity related to critical infrastructure, stipulates that: "The economic and social development stimulated by the accelerated technological progress and the phenomenon of globalization have strengthened the strong interdependence and interaction of the systems that ensure the security and welfare of the human society. The need to interconnect systems against the backdrop of the trend of removing administrative barriers and access to new emerging markets, along with the integration of infrastructure networks, leads to global security and stability developments." (*** National Strategy on Critical Infrastructure Protection, 2011, p.10) The starting point in writing of this article relies on the fact that the organizational proactive processes, as valuable resources, are based on a flexible learning process. These resources ensure the sustainability of public and private capacities, civil and military alike, and are coupled to the challenges of a highly dynamic macro-environment, which are characterized by uncertainty, ambiguity and volatility. In this context, asymmetric threats and especially hybrid threats, containing a complex information vector with different intensities, influence the social functionality in different basic areas such as medical services, food, defense, energy, administration and governance, communications, etc. The recent events fully demonstrate the thesis which states that the security has not only a black and white spectrum, but also gray hues, with interdisciplinary and cross-border nuances becoming the points of interest, both through the induced vulnerability potential and the means of provocation that surpass the strictly specialized military area. Conducting the experimentation process type "what happens if" is a very costly and risky one from the perspective of actual way of carrying out, aspect which has at least the same intensity also for the critical infrastructure field. The expertise of this type of training in the military domain is accepted and the learning and education process for the security of the assets must be an effective and flexible one, built on the formulation, activation and/or updating of some mental models. The research team draws attention to the exploiting of predefined symbols, which are also employed in the military operational planning, as a less-used idea in the critical infrastructure literature, and the completion, where appropriate, with new ones. These symbols could be used for the graphical materialization of risk situations regarding the safe operation of a critical infrastructure system, according to a proper tailored scenario, in a training exercise of public authorities or private operators with responsibilities related to the management of crises based on disasters. A special role in the process of improving knowledge dedicated to increasing the level of security of critical infrastructure must be played by the educational, military and civil institutions, through special programs dedicated to the public sector that is involved in the management of critical infrastructure issues (postgraduate courses for further training or specialization, master D. Badea , M.-M. Coman, D. Iancu, O. Bucoveţchi - Critical Infrastructure Protection in the Knowledge Society: Increasing the Safety Level by Use of Learning based on Wargaming Expertise 47 programs, etc.). In the knowledge of economy, universities face new challenges and they have to adapt to the new contexts. First, knowledge life cycle is decreasing and the focus of teaching and learning processes should shift from knowledge transfer to the students toward developing thinking skills (Bratianu & Vătămănescu, 2016). Through this paper it is proposed, that the tool presented as a solution for learning in the field of critical infrastructure be implemented for testing and validation within a postgraduate program conducted in the Land Forces Academy of Sibiu and within a master program conducted in the Faculty of Entrepreneurship, Business Engineering and Management/ University Politehnica of Bucharest. It is a good thing, in the sense of the above-mentioned, the fact that people are more and more aware of the role of knowledge, as an engine of generating performance in the field of security of critical infrastructures. An example supporting this statement is also one of the conclusions that emerged from the Zagreb Forum in 2017 - Resilient Critical Infrastructure (2nd Zagreb Security Forum), which encourages the application of the "knowledge for development" paradigm as the foundation for designing critical documents on the protection of National Critical Infrastructures. (https://www.zagrebsecurityforum.com) The critical infrastructure security is a topic whose approach is achieved by taking into consideration both officially validated regulations and the level of maturity of the population's ability to objectively raise the awareness related to the main mechanisms of causes and effects specific to malfunctions that could emerge at any critical infrastructure. Based on the above assertion, the main purpose of this applied research operationalized by predominantly qualitative means is the demonstration of viability of methodological framework provided by the wargaming procedures that can be exploited in a specific way also for critical infrastructures issues. In order to preserve the integrity of the real system framework, the focus was on a few variables - actors, rules, resources - that have been considered by authors the most important factors of the research. Finally, it is brought to the attention of public authorities and all institutions involved in the management of critical infrastructure security, a feasible possibility of using a flexible and effective training method based on wargaming methodology that can be developed in an integrating way at the national level, which is in fact the added value of this paper. References Cohen F. (2010). What makes critical infrastructures Critical?, International Journal of Critical Infrastructure Protection, 3, 53-54. Bratianu, C. (2015). Gândirea strategicǎ, Bucureşti: Editura Pro Universitaria. Bratianu, C., & Vătămănescu, E.M. (2016). Students’ perception on developing conceptual generic skills for business. In Moffett, S., & Galbraith, B. (Eds.), Proceedings of the 17th European Conference on Knowledge Management, Reading: Academic Conferences and Publishing International, 101-108. Denyer, D. (2017). Organizational Resilience: A Summary of Academic Evidence, Business Insights and New Thinking. BSI and Cranfield School of Management: Cranfield, UK. Paiano, R., Caione, A., Guido, A.L. (2015). Business Process Management - A Traditional Approach versus a Knowledge Based Approach. BRAIN-Broad Research in Artificial Intelligence and Neuroscience, 6(1), 54-69. Treapat, L. & Gheorghiu, A. (2017). Artificial Systems and Models for Risk Covering Operations. BRAIN-Broad Research in Artificial Intelligence and Neuroscience, 8(1), 59-72. Walker, J. & Cooper, M. (2011). Genealogies of resilience: From systems ecology to the political economy of crisis adaptation. Security Dialogue, 42(2), 143-160. ***Strategia națională privind protecția infrastructurilor critice, MONITORUL OFICIAL AL ROMÂNIEI, PARTEA I, Nr. 555/4.VIII.2011 http://eturwg.c4i.gmu.edu/?q=node/128, accessed in april 2018. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/1 42533/20130301_red_teaming_ed2.pdf accessed in june 2018. https://www.fgdc.gov/HSWG/index.html accessed in july 2018. BRAIN – Broad Research in Artificial Intelligence and Neuroscience Volume 9, Issue 4 (November, 2018), ISSN 2067-3957 48 https://www.zagrebsecurityforum.com accessed in june 2018. http://www.nwcfoundation.org accessed in july 2018. Assoc. Prof. Dorel Badea graduated the Military Technical Academy of Bucharest in 2002 and received the Ph.D. degree in Industrial Engineering (2011) from Technical University of Cluj-Napoca, currently being head of Management Department in “Nicolae Bǎlcescu” Land Forces Academy of Sibiu. He is holding courses in defense resource management, modeling and simulation of military actions and critical infrastructure protection. He wrote over forty essays issued in different scientific specialized reviews and proceedings on general management, military engineering and security. Assoc. Prof. Dumitru Iancu is vice dean for scientific researcher at the Military Management Faculty, “Nicolae Bǎlcescu” Land Forces Academy of Sibiu. He holds a PhD in Management from the Lucian Blaga University of Sibiu (2011). His research interests include human resources management and applications of general management theory in security technology systems. He is author and active participant at different international conferences and participated at many activities at national level related to research and innovations strategies necessary to be implemented. Senior Trng. Instr. Marin-Marian Coman is PhD Student in Industrial Engineering at University Politehnica of Bucharest and graduated “Nicolae Bǎlcescu” Land Forces Academy of Sibiu (2000). He holds a M.Sc. in Management and Technology at the same military university (2015) and a M.Sc. in Science and Computer Engineering (2013) at "Lucian Blaga" University of Sibiu. He collaborates with members of NATO Modeling and Simulation Group and his main areas of interest include operational planning and exercises and conceptual modeling of spatial critical infrastructures. Assoc. Prof. Olga Bucoveţchi received her BSc in Economic Engineering (2006) and PhD in Industrial Engineering (2014) from University Politehnica of Bucharest. Now she is assoc. prof. at University Politehnica of Bucharest. She is member of Association of Economist Managers and Engineers in Romania and Romanian Association for the Promotion of Critical infrastructure and Services Protection. While working at UPB she had several collaborations within national and international research projects related to risk management, critical infrastructure protection and business continuity.