2014
DOI: 10.1016/j.tej.2014.01.011
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security and Critical Energy Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
46
0
6

Year Published

2014
2014
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(52 citation statements)
references
References 10 publications
0
46
0
6
Order By: Relevance
“…Furthermore, our increasing dependence on network infrastructures has attracted the attention of cyber criminals. These individuals aim to disrupt the operation of large corporations or even nations through cyber-attacks that are targeted at the communication infrastructure [27]. In this case, a failure is the result of deliberate malicious activities that can compromise a target network service.…”
Section: General Principlesmentioning
confidence: 99%
“…Furthermore, our increasing dependence on network infrastructures has attracted the attention of cyber criminals. These individuals aim to disrupt the operation of large corporations or even nations through cyber-attacks that are targeted at the communication infrastructure [27]. In this case, a failure is the result of deliberate malicious activities that can compromise a target network service.…”
Section: General Principlesmentioning
confidence: 99%
“…Distributed generation is, therefore, less sensitive than a centralised system [48]. The increased use of computer systems to control energy systems can increase the systemic risk by permitting remote cyber-attacks on software by states or skilled non-state actors [49] (systemic risk is the risk of a system collapse, see [50]). …”
Section: Conversion and Distributionmentioning
confidence: 99%
“…The reality of the aforementioned threats (Section I, Item 1-4) has emerged over the past several decades [1][2][3][4]. While SCADA systems were originally designed to be closed systems, the number of systems driving physical infrastructure connected to the Internet and interlinked with other systems is increasing each year [27]. From these limits derives the need to develop pertinent threat and risk modeling approaches.…”
Section: Cyber Vulnerabilities In Scada Systemsmentioning
confidence: 99%