Abstract

The purpose of the paper is to analyze the vulnerabilities of Critical Energy Infrastructures' systems in the event of cyber-attack. The global tendency of cyber-attacks puts Critical Energy Infrastructures on one of the first places for targets. Critical Infrastructure Protection (CIP) has become an increasingly relevant topic in the global industrial environment, as the consequences of cyber-attacks toward ICS can result in physical disruption and loss of human lives. The analysis presented in the paper will take into consideration three different case scenarios of cyber-attacks to Critical Energy Infrastructures, and will evaluate the outcomes and the tactics used by the organizations' response and recovery.

Highlights

  • With the beginning of a new decade, the world in which we live is changing constantly, with continuous implementation of new types of technologies

  • The convergence on Informational Technology (IT) and Operational Technology (OT) technology brought to life a new concept of online systems, alongside multiple innovations in the management of Critical Infrastructures(CI)

  • Alongside the innovation comes a new concept of cybersecurity, as the protection of CI is becoming more difficult to achieve from both IT and OT perspective

Read more

Summary

Introduction

With the beginning of a new decade, the world in which we live is changing constantly, with continuous implementation of new types of technologies. The analysis is conducted with the focus on types of frameworks developed for the response to cyber incidents in critical infrastructures. The latter will be evaluated in terms of prevention and solution applied after the end of the threat. This focus of the paper is due to the lack of effective comprehensive framework appliable to critical energy infrastructure protection, maybe because of its high complexity. The methodology that will be used to conduct this reasearch will be of comparative approach: the phenomenon that will be analyzed will highlight the response and the cybersecurity level of critical energy infrastructures against cyber-attacks. Before diving into the analysis it is important to understand in general the level of security in critical energy infrastructures

Vulnerabilities in critical energy infrastructure
Examples of cyber-attacks
Observations and recommendations
Findings
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call