2023
DOI: 10.3390/s23084060
|View full text |Cite
|
Sign up to set email alerts
|

Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure

Abstract: Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service dis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 37 publications
(5 citation statements)
references
References 59 publications
0
5
0
Order By: Relevance
“…They have the potential to inflict significant harm on businesses, products, and data. In [18], a summary of the major attacks that have occurred in the last 20 years against critical infrastructures was presented, also including an analysis of the types of attacks, consequences, vulnerabilities, victims, and attackers. The paper also provided an estimation of the number of major cyber attacks that will occur on critical infrastructure in the future.…”
Section: Security Update Requirements For Iot Devicesmentioning
confidence: 99%
“…They have the potential to inflict significant harm on businesses, products, and data. In [18], a summary of the major attacks that have occurred in the last 20 years against critical infrastructures was presented, also including an analysis of the types of attacks, consequences, vulnerabilities, victims, and attackers. The paper also provided an estimation of the number of major cyber attacks that will occur on critical infrastructure in the future.…”
Section: Security Update Requirements For Iot Devicesmentioning
confidence: 99%
“…Furthermore, transmission should be regulated in a way that the system developer should take precautions against cascading failures to improve the system's capacity to withstand the effects of a cyberattack. Since each of these failures is independent (Riggs et al, 2023). Large "domino effect" networks are likely to suffer significant damage in response to even small disturbances, which severely restricts the range of situations in which resilient operation and effective absorption and recovery are still feasible.…”
Section: Strategies For Enhancing Cyber Resiliencementioning
confidence: 99%
“…Cyberattacks were identified as a relevant source of risk [16][17][18], although the risk to the technical systems in the study area is considered to be low due to the spatial separation of the systems. In the present case study, the operation of the water supply systems is only at low risk from cyberattacks.…”
Section: Hazard Analysismentioning
confidence: 99%
“…Other threats to the water supply come from sabotage and acts of war. An increase in cyberattacks on critical infrastructure is currently to be expected [16][17][18].…”
Section: Introductionmentioning
confidence: 99%