2016
DOI: 10.1007/978-3-319-51043-9_7
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threats Impacting Critical Infrastructures

Abstract: Nowadays it is important to note that security of critical infrastructures and enterprises consists of two factors, those are cyber security and physical security. It is important to emphasise that those factors cannot be considered separately and that the comprehensive cyber-physical approach is needed. In this paper we analyse different methods, methodologies and tools suits that allows modelling different cyber security aspects of critical infrastructures. Moreover, we provide an overview of goals an challe… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0
1

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(10 citation statements)
references
References 7 publications
0
9
0
1
Order By: Relevance
“…Currently, major differences exist in the way companies are using technologies and adopting security practices into their design, development and operational processes making it more difficult to mitigate and fight against cyber attacks [14]. This problem has been elevated by the lack of adoption of security and cyber resilient posture by the stakeholders.…”
Section: Cyber Resilience and Cyber Security Regulationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Currently, major differences exist in the way companies are using technologies and adopting security practices into their design, development and operational processes making it more difficult to mitigate and fight against cyber attacks [14]. This problem has been elevated by the lack of adoption of security and cyber resilient posture by the stakeholders.…”
Section: Cyber Resilience and Cyber Security Regulationsmentioning
confidence: 99%
“…As they have been designed to mitigate a certain class of known attacks [13]. Nevertheless, this strategy has been found vulnerable and compromised due to software vulnerabilities, microarchitectural weaknesses and poor use of secure design practices [8], [14], [15], [16], [17], [18].…”
Section: Introductionmentioning
confidence: 99%
“…The rising numbers of attacks aimed at citizens, societies and even seemingly secure systems built for critical infrastructures are easily observable [2,5]. The inadequacy of signaturebased systems in cyberattack detection is one of the primary causes of this situation.…”
Section: Cybersecurity: a Quick Primer On Challenges And Trendsmentioning
confidence: 99%
“…This situation is echoed by the rankings of cyberattacks, e.g., by OWASP [1], where SQLIA (SQL Injection Attack) and XSS (Cross Site Scripting) are on top of the list. Selected examples of critical systems which were successfully attacked through the application layer are the flight management system in Poland or the energy grid in Ukraine [2]. Therefore, we aim at proposing novel methods to effectively detect and counter the cyberattacks in the application layer.…”
Section: Introduction and Rationalementioning
confidence: 99%
“…y que hasta el momento no podían más que accederse de manera física y presencial. De ahí que se introduzcan las llamadas ciberamenazas en los planes estratégicos de Protección de Infraestructuras Críticas (Choras, Kozik, Flizikowski, Hołubowicz, & Renk, 2016; véase al respecto Rinaldi, Peerenboom, & Kelly, 2001) y el ciberespacio se plantee como una amenaza para la soberanía y seguridad nacional (Bendrath, 2001;Manjikian, 2010, p. 391), tal y como plantea la recientemente publicada Estrategia Nacional de Ciberseguridad (Departamento de Seguridad Nacional, 2019).…”
Section: Fase Actual: Un Nuevo Conceptounclassified