Abstract
The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions. This problem field is studied by the author from scientific point of view (from point of view of computer science and information security of large systems) and this paper reflects results of such studies. Many special technical terms were omitted or substituted in order to make the statement accessible to wider range of people concerned.
Highlights
It is important to define what we mean by energy infrastructure before we continue to consider systematization and analysis of threats to it
The present paper is concerned with potential cyberterrorist threats which the objects of national energy infrastructure may undergo, directions of development of counteraction means for these threats, problems arising during this development and their possible solutions
Tasks are defined by functions of separate sectors of energy infrastructure, including organization of industrial and financial activities, which are directed at extraction, processing, storage and transporting of following resources: oil and gas resources; electro-energy resources; nuclear energetic resources
Summary
It is important to define what we mean by energy infrastructure before we continue to consider systematization and analysis of threats to it. Tasks are defined by functions of separate sectors of energy infrastructure, including organization of industrial and financial activities, which are directed at extraction, processing, storage and transporting of following resources: oil and gas resources; electro-energy resources; nuclear energetic resources. The needed level of organization of all interconnected processes of extraction and primary processing of raw material, storage, transportation and resource delivery, forming a continuous technological cycle, is possible in modern conditions only on the condition of effective industrial and financial support. Objects of destructive information impacts on critical energy infrastructure include: automated control systems for technological processes at lower level of their implementation and their components (servers, SCADA in the first place, automated working places, microprocessor controllers, telemechanics services); information and telecommunication networks supporting automated technological process control systems; information objects, supporting processes of acquiring, processing and transporting energy resources (objects, supporting compressor systems, gas swap, electric supply and others). These errors usually do not depend on the purpose of the program
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.