2020
DOI: 10.11648/j.ijem.20200401.12
|View full text |Cite
|
Sign up to set email alerts
|

Water Industry Cyber Security Human Resources and Training Needs

Abstract: Cyber-attacks are a growing and persistent threat to water infrastructure, including drinking water and wastewater systems. Water infrastructure uses a number of technical control systems to manage and track infrastructure properties, including hardware and software, such as monitoring and data acquisition systems, process control systems, and other devices, such as programmable logic controllers, that control data gathering equipment and information technology. As these systems become more connected to corpor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 3 publications
0
3
0
Order By: Relevance
“…The human is the greatest point of vulnerability for an attacker. Usually, attackers use social engineering methods to enter the environment, and a social engineering attack is conducted via human factors such as employees, managers, and contractors, exploiting a person’s lack of education, greedy nature, or psychological issue [ 24 ].…”
Section: Vulnerabilities Challenges and Future Prospective In The Iio...mentioning
confidence: 99%
See 1 more Smart Citation
“…The human is the greatest point of vulnerability for an attacker. Usually, attackers use social engineering methods to enter the environment, and a social engineering attack is conducted via human factors such as employees, managers, and contractors, exploiting a person’s lack of education, greedy nature, or psychological issue [ 24 ].…”
Section: Vulnerabilities Challenges and Future Prospective In The Iio...mentioning
confidence: 99%
“…Cybersecurity has developed a huge interest in the water industry and some educational programs have been offered [ 20 , 21 ]. This provoked great interest in the research environment [ 22 , 23 , 24 , 25 , 26 , 27 ], as earlier cybersecurity incidents may have provided insightful information that could be used to inform current cyber defense efforts, promoting investments and initiatives and increasing their applicability and efficiency. This calls for a thorough compilation and analysis of these instances, which is currently lacking.…”
Section: Introductionmentioning
confidence: 99%
“…The water sector has attempted to bridge the gap between operating and information technologies by overlapping these systems to reduce maintenance costs and optimise the control and monitoring systems. The potential for cyber threats has increased due to the overlapping of these systems, (Wei et al, 2010;Skiba, 2020). It is important to note that critical infrastructure, such as the water infrastructure, is vulnerable if the information technology systems are not technically well protected, (Cavelty, 2007;Germano, 2019).…”
Section: Introductionmentioning
confidence: 99%