Abstract

The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions. This problem field is studied by the author from scientific point of view (from point of view of computer science and information security of large systems) and this paper reflects results of such studies. Many special technical terms were omitted or substituted in order to make the statement accessible to wider range of people concerned.

Highlights

  • It is important to define what we mean by energy infrastructure before we continue to consider systematization and analysis of threats to it

  • The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions

  • Tasks are defined by functions of separate sectors of energy infrastructure, including organization of industrial and financial activities, which are directed at extraction, processing, storage and transporting of following resources: oil and gas resources; electro-energy resources; nuclear energetic resources

Read more

Summary

Introduction

It is important to define what we mean by energy infrastructure before we continue to consider systematization and analysis of threats to it. Tasks are defined by functions of separate sectors of energy infrastructure, including organization of industrial and financial activities, which are directed at extraction, processing, storage and transporting of following resources: oil and gas resources; electro-energy resources; nuclear energetic resources. The needed level of organization of all interconnected processes of extraction and primary processing of raw material, storage, transportation and resource delivery, forming a continuous technological cycle, is possible in modern conditions only on the condition of effective industrial and financial support. Objects of destructive information impacts on critical energy infrastructure include: automated control systems for technological processes at lower level of their implementation and their components (servers, SCADA in the first place, automated working places, microprocessor controllers, telemechanics services); information and telecommunication networks supporting automated technological process control systems; information objects, supporting processes of acquiring, processing and transporting energy resources (objects, supporting compressor systems, gas swap, electric supply and others). These errors usually do not depend on the purpose of the program

Approaches to Counteraction Organization
Law Level of Ensuring Information Security
Administrative Level of Information Security
Procedural Level of Information Security
Technical Level of Information Security
Operating System Distributions
Monitoring of Functionality State
Tools for Analyzing Source Code for Vulnerabilities
Automated System for Information Analysis

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.