2022
DOI: 10.3390/w15010168
|View full text |Cite
|
Sign up to set email alerts
|

A Systemic Review of the Cybersecurity Challenges in Australian Water Infrastructure Management

Abstract: Cybersecurity risks have become obstinate problems for critical water infrastructure management in Australia and worldwide. Water management in Australia involves a vast complex of smart technical control systems interconnected with several networks, making the infrastructure susceptible to cyber-attacks. Therefore, ensuring the use of security mechanisms in the control system modules and communication networks for sensors and actuators is vital. The statistics show that Australia is facing frequent cyber-atta… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 21 publications
0
5
0
Order By: Relevance
“…22 Water systems increasingly rely on complex systems and smart technology making them vulnerable to cyber threats as well as disruptions in power. 23,24 One group looked at attacks on water infrastructure, particularly dam projects in Afghanistan, India, and Pakistan. They found in all three countries, there are water infrastructure projects that have faced scrutiny by local groups due to mistrust in the government or concern that the project is used to further domestic or foreign policy agenda.…”
Section: Discussionmentioning
confidence: 99%
“…22 Water systems increasingly rely on complex systems and smart technology making them vulnerable to cyber threats as well as disruptions in power. 23,24 One group looked at attacks on water infrastructure, particularly dam projects in Afghanistan, India, and Pakistan. They found in all three countries, there are water infrastructure projects that have faced scrutiny by local groups due to mistrust in the government or concern that the project is used to further domestic or foreign policy agenda.…”
Section: Discussionmentioning
confidence: 99%
“…The efforts to bolster its cyber defenses must contend with these geopolitical complexities. Despite these challenges, the shared commitment to enhance cyber-security emphasizes the importance of these issues on the global stage (Bello, Jahan, Farid, & Ahamed, 2022). As other countries continue to adopt strategies of each other.…”
Section: Challenges In Cyber Law and Cyber-securitymentioning
confidence: 99%
“…The authors of [ 13 ] studied all means of maliciously accessing a plant such as through sensors, actuators, networks, and PLCs, etc. In [ 26 , 27 , 30 , 31 , 35 , 36 , 39 ], the authors studied attacks through sensors in the environment. Ref.…”
Section: Secure Water Treatment Plant Components and Processes And At...mentioning
confidence: 99%
“…The authors of [ 89 ] explained the means by which to overcome the challenges in water treatment plant security. Here, we would like to discuss some challenges in IIoT or Industry 4.0 [ 27 ].…”
Section: Vulnerabilities Challenges and Future Prospective In The Iio...mentioning
confidence: 99%
See 1 more Smart Citation