2019
DOI: 10.1007/978-3-030-37670-3_1
|View full text |Cite
|
Sign up to set email alerts
|

Everything Is Awesome! or Is It? Cyber Security Risks in Critical Infrastructure

Abstract: Industrial Control Systems (ICS) play an important role in the monitoring, control and automation of critical infrastructure such as water, gas, oil and electricity. Recent years have seen a number of high profile cyber attacks on such infrastructure exemplified by Stuxnet and the Ukrainian Power Grid attacks. This naturally begs the question: how should we manage cyber security risks in such infrastructure on which the day-today functioning of societies rely? What are the complexities of managing security in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 7 publications
0
10
0
Order By: Relevance
“…Generally, much fewer works exist directly discussing these challenges in the context of CI systems. In the field of security, recent cyberattacks on CI have been analyzed in some studies [13], [14] or general security threats were discussed [20], [21].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally, much fewer works exist directly discussing these challenges in the context of CI systems. In the field of security, recent cyberattacks on CI have been analyzed in some studies [13], [14] or general security threats were discussed [20], [21].…”
Section: Related Workmentioning
confidence: 99%
“…If the infrastructure is not properly updated, zero-day security flaws or known security vulnerabilities add on a potential attack surface that an attacker might exploit. Technological heterogeneity, if present in the system, might contribute to the problem as another factor [20].…”
Section: A Principal Areasmentioning
confidence: 99%
“…Furthermore, Rashid. et al [10] analyzed the most effective attacks against ICS and resulted in four types of perception errors, which play a major role in the success of these attacks: system qualities, system boundaries, observability, and controllability.…”
Section: ) General Attacks Classificationsmentioning
confidence: 99%
“…A casual search on Shodan reveals hundreds of ICS devices visible to the public internet. Additionally, the advent of Industry 4.0 has introduced internet-of-things (IoT) and cloud components into industrial systems, providing new methods of entry to attackers [6,15].…”
Section: Background and Related Work 21 Backgroundmentioning
confidence: 99%