2022
DOI: 10.1177/20539517221108369
|View full text |Cite
|
Sign up to set email alerts
|

When the future meets the past: Can safety and cyber security coexist in modern critical infrastructures?

Abstract: Big data technologies are entering the world of ageing computer systems running critical infrastructures. These innovations promise to afford rapid Internet connectivity, remote operations or predictive maintenance. As legacy critical infrastructures were traditionally disconnected from the Internet, the prospect of their modernisation necessitates an inquiry into cyber security and how it intersects with traditional engineering requirements like safety, reliability or resilience. Looking at how the adoption o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 60 publications
0
8
0
Order By: Relevance
“…Organizational structures and roles. The upsurge of cybersecurity incidents is not reflected in the tasks and expected knowledge of the OT personnel [29,20,30]. The OT personnel and operators perceive any system anomalies but struggle to identify the origin of the anomaly (e.g., (un)intentional faults).…”
Section: Non-technical Challengesmentioning
confidence: 99%
“…Organizational structures and roles. The upsurge of cybersecurity incidents is not reflected in the tasks and expected knowledge of the OT personnel [29,20,30]. The OT personnel and operators perceive any system anomalies but struggle to identify the origin of the anomaly (e.g., (un)intentional faults).…”
Section: Non-technical Challengesmentioning
confidence: 99%
“…These are simple devices with sensors and network connectivity, such as smart devices like cameras or sensors, or wearables, like pacemakers and automated insulin pumps, intended to be part of a greater system. 58 Manufacturers sometimes forgo updates to the software in IoT devices to cut costs, which, as time passes, makes them increasingly vulnerable to cyberattacks. 59 For this reason, the initial approval of a device does not ensure compliance throughout the medical devices' lifecycle.…”
Section: The United States: An Opaque and Arbitrary Regulatory Framew...mentioning
confidence: 99%
“…In recent years, CPS has seen a rise in connections, which has raised cybersecurity concerns. Aside from classic information system vulnerabilities, CPS has new issues due to heterogeneous devices and protocols and stringent reliability requirements (Michalec et al, 2022). The critical infrastructure could be formed as laboratories for practice, intelligence school and training, qualified departments and materials, and cyber-physical systems (Qi et al, 2018;Quincozes et al, 2022).…”
Section: Cybersecurity and Critical Infrastructurementioning
confidence: 99%