We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.
The main task of planning documents is to achieve maximal rationality in the use of space, spatial resources, and balanced territorial development. The preparation of plans is regulated by a legislative framework, which embraces multiple phases and stakeholders. In a perfect planning process, it would be expected that all the elements are well coordinated and brought to common understanding, but in reality, obstacles and challenges can occur in any of these steps, especially in the implementation phase. Although a plan is fully prepared to be practiced, its implementation might be omitted. Therefore, this article analyzes the full process of spatial and urban planning from the perspective of plan implementation. The methodology is based on a combination of different data collection methods (interviews, fieldwork, direct observation) with the analysis of plans and the particular mention of those plans that picture the implementation issues the most. Also, legislative acts and semi-annual and annual reports on the achievements of the local government budget are analyzed. The approach indicates that plan implementation depends the most on the willingness of the government to perform changes in the system and to peruse punitive policy comprehensively. Although it is about implementation at the local level, the success primarily depends on clear definitions given in the legislative acts, freedom of the local communities to make their own decisions, and financial decentralization, side by side with the regional and local circumstances, institutional technical and staff capacities, and application of participatory planning that involves actors from various sectors.
The Internet has become an inevitable form of communication, which enables connections with colleagues, friends, or people with similar interests, regardless of physical barriers. However, there is also a dark side to the Internet, since an alarming number of adolescents admit they have been victims or bystanders of cyberbullying. In order to make the Internet a safer environment, it is necessary to develop novel methods and software capable of preventing and managing cyberbullying. This chapter reviews existing research in dealing with this phenomenon and discusses current and potential applications of text mining techniques for the detection of cyberbullying.
We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.