Abstract

The importance of a nation’s infrastructure is a vital core for economic growth, development, and innovation. Health, wealth, access to education, public safety, and helping prepare for global crises like pandemics are all dependent on functioning and reliable infrastructures. In decades, the substantial threats affecting infrastructures globally whether in the form of extreme weather, Covid-19 pandemic, or the threats of state and non-state actors’ hackers, demanded urgency in building resilience infrastructures both during crises and in more stable conditions. At the same time, the adoption of emerging and innovative technologies boosts the development of the infrastructures using information, communication, and technology (ICT) platform. This shift accelerated its evolution toward digitization where interdependent and interconnected cyberspace demands collaborative and holistic strategies in protecting critical and high risks infrastructure assets from a growing number of disruptive cyberattacks. These ever-evolving cyber threats are creating increasingly dangerous and targeted cyberattacks to damage or disrupt the critical infrastructures delivering vital services to government, energy, healthcare, transportation, telecommunication, and other critical sectors. The infrastructure’s high risks assets present serious challenges and are crucial to safety, efficiency, and reliability. Any nation must recognize and determine how to cope with any type of threats to their critical infrastructure as well as the strategies to remain resilient. This article first describes the challenges and the need for critical infrastructure protection including the related global risks challenges. It then reviews the United Nations, the European Union, and the United States’ strategies, priorities, and urgencies of critical infrastructure protection. Subsequently, it surveys the critical infrastructure protection resilience strategies including ISO, IEC, ISA, NIST, CAF and CMM frameworks.

Highlights

  • Understanding the challenge Recognizing that the national and economic protection of any nation depends on the reliable functioning of critical infrastructures (CIs), the CIs are arguably more at risk than ever

  • The Framework Core has four key elements: 1) Functions form necessary attributes to assist organizations in managing cybersecurity risks, 2) Categories are a subset of a Function that group the cybersecurity issues such as detection methods, asset management, and controls 3) Subcategories are a subset of a Category that assists in achieving the outcomes of each Category such as the investigation of notification from detection systems 4) Information References represent as a section of standards, guidelines, and practices that is frequently used in critical infrastructure sectors

  • The ISO/IEC 27000 series of standards were published by ISO and IEC to provide a systematic approach of Information Security Management System (ISMS) for risk management for all organization sizes and sectors

Read more

Summary

Introduction

Understanding the challenge Recognizing that the national and economic protection of any nation depends on the reliable functioning of critical infrastructures (CIs), the CIs are arguably more at risk than ever. In addition to partnership, facilitating information sharing and awareness programs can be used voluntary and regulatory to provide security and resilience for critical infrastructures The five key elements of the UNSC resolution 2341 (2017), shown, are recognized as 1) the awareness emphasizes the strengthening and reinforcing knowledge as well as recognizing the vulnerability and threats on critical infrastructures, 2) the capabilities evaluate the strength of states’ capacities, the partnerships of private and public sectors to mitigate the risk of cyberattacks to a controllable level, 3) the resilience promotes methods of preparation, prevention, crisis management, and recovery to reduce cyberattacks intended to destroy or disable critical infrastructures, 4) the distribution.

Cybersecurity Assessment Strategies
Implementation Methods
Response and recovery planning
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call