Cyber security of a critical infrastructure

Автор: Slavimir Vesić, Martin Bjelajac

Журнал: Pravo - teorija i praksa @pravni-fakultet

Рубрика: Original scientific work

Статья в выпуске: 2 vol.40, 2023 года.

Бесплатный доступ

A critical infrastructure consists of basic assets and facilities whose functioning has a significant impact on the society and economy of a country, as well as on its security. The life and work of the citizens of a country are largely dependent on a smooth operation of various energy, telecommunication, water and sewage facilities, as well as the network of hospitals and health institutions, transportation, etc. The safe functioning of these systems is a prerequisite for the existence and development of a social community in an area. Therefore, it is necessary to undertake all necessary activities to preserve a critical infrastructure both in reality and cyberspace. With the development of the Internet, there has been a transformation of people’s work and life in the broadest sense, in such a way that it has become an indispensable part of everyday life of each of us. Together with the largest global network increasingly used as well as the various services people necessarily being relied on in the new reality the world encountered during the COVID-10 pandemic, there has been created a vast space attracting the malicious users. They act by using the known mechanisms of functioning communication networks and other information technologies, finding the system vulnerabilities and exploit them. In this paper, we will analyze the cyber security of a critical infrastructure, cyber attacks on a critical infrastructure and the measures needed to be taken to mitigate the consequences of cyber attacks.

Еще

Security, cyber security, critical infrastructure, cyber attacks

Короткий адрес: https://sciup.org/170202146

IDR: 170202146   |   DOI: 10.5937/ptp2302077V

Список литературы Cyber security of a critical infrastructure

  • Alagappan, A., Baptist, L. J., Venkatachary, S. K., Samikannu, R., Prasad, J., & Immaculate, A. (2020). Impact of Biological Pandemic in Critical Infrastructure Services – Are We Heading for a Cyber Pandemic? European Journal of Molecular & Clinical Medicine, 7(3), pp. 5154–5177
  • Alladi, T., Chamola, V., & Zeadally, S. (2020). Industrial Control Systems: Cyberattack Trends and Countermeasures. Computer Communications, 155, pp. 1–8. https://doi.org/10.1016/j.comcom.2020.03.007
  • Australian Cyber and Infrastructure Security Centre. (2023). Defining critical infrastructure. Downloaded 2023, February 26 from https://www.cisc.gov.au/what-is-the-cyber-and-infrastructure-security-centre/defining-critical-infrastructure
  • Bjelajac, Ž. Đ., & Jovanović, M. B. (2013). Pojedini aspekti bezbednosne kulture na Internetu [Certain aspects of security culture on the Internet]. Kultura polisa, 10(21), pp. 99–114.
  • Bjelajac, Ž., & Filipović, A. (2020). Internet Addiction Disorder (IAD) as a Paradigm of Lack of Security Culture. Kultura polisa, 17 (43), pp. 239-258
  • Bjelajac, Ž. Đ., & Vesić, S. L. (2020). Security of information systems. Pravo – teorija i praksa, 37(2), pp. 63–76. https://doi.org/10.5937/ptp2002063b
  • Chen, P., Desmet, L., & Huygens, C. (2014). A study on Advanced Persistent Threats. In: Decker, B. De & Zúquete, A. (eds.), Communications and Multimedia Security. CMS 2014. Lecture Notes in Computer Science, (pp. 63-72), Springer Berlin Heidelberg, https://doi.org/10.1007/978-3-662-44885-4_5
  • Crowdstrike. (2023). What is an Advanced Persistent Threat? Cybersecurity 101. Downloaded 2023, March 10 from https://www.crowdstrike.com/cybersecurity-101/advanced-persistent-threat-apt/
  • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 51(1), pp. 23–40. https://doi.org/10.1080/00396338.2011.555586
  • García Zaballos, A., & Jeun, I. (2016).Best Practices for Critical Information Infrastructure Protection (CIIP): Experiences from Latin America and the Caribbean and Selected Countries. Inter-American Development Bank
  • Holloway, M. (2015). Slammer Worm and David-Besse Nuclear Plant. Downloaded 2023, March 15 from http://large.stanford.edu/courses/2015/ph241/holloway2/
  • IBM Security. (2021). Cost of a Data Breach Report 2021
  • IBM Security. (2022). Cost of a Data Breach Report 2022
  • Lukić, B. (2005). Uloga infrastrukture u prostornom razvoju Srbije – doktorska disertacija [The role of infrastructure in the spatial development of Serbia – doctoral dissertation]. Beograd: Geografski fakultet, Univerzitet u Beogradu
  • Milosavljević, B., & Vučinić, D. (2021). Odnos prema kritičnoj infrastrukturi u Republici Srbiji [Attitude towards critical infrastructure in the Republic of Serbia].Vojno delo, 73(4), pp. 42-56.https://doi.org/10.5937/vojdelo2104042M
  • NIST. (2022). critical infrastructure. Committee on National Security Systems (CNSS) Glossary. Downloaded 2023, February 20 from https://csrc.nist.gov/glossary/term/critical_infrastructure
  • OECD. (n.d.). Multiple hazards and threats can disrupt critical infrastructure. Downloaded April 21, 2023, from https://www.oecd-ilibrary.org/sites/76326acb-en/index.html?itemId=/content/component/76326acb-en
  • Pranggono, B., & Arabo, A. (2021). COVID-19 pandemic cybersecurity issues. Internet Technoogy Letters, 4(2), pp. 1–6. https://doi.org/10.1002/itl2.247
  • Public Safety Canada. (2022). Renewing Canada’s Approach to Critical Infrastructure Resilience: What We Heard Report. Downloaded 2023, February 15 from https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/rnwng-cnd-pprch-crtcl-nfrstrctr-rslnc-2022/rnwng-cnd-pprch-crtclnfrstrctr-rslnc-2022-en.pdf
  • Stošić, L. V., & Janković, A. V. (2022). Cybercrime in the Republic of Serbia: Prevalence, situation and perspectives. Kultura polisa, 19(4), pp. 82–99. https://doi.org/10.51738/Kpolisa2022.19.4r.82sj
  • Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. (2015). Special Publication 800-82 Revision 2 – Guide to Industrial Control Systems (ICS) Security. Downloaded 2023, February 25 from https://doi.org/10.6028/NIST.SP.800-82r2
  • Trbojević, M. (2018). Zaštita kritičnih infrastruktura – iskustva tranzicionih zemalja [Protection of critical infrastructures – experiences of transition countries]. Politička revija, 56(2), pp. 99–118. https://doi.org/10.22182/pr.5622018.5
  • Vericlave. (2018). The Kemuri Water Company Hack. Downloaded 2023, February 25 from https://www.vericlave.com/wp-content/uploads/2018/10/Vericlave_WhitePaper_KemuriWater_1018_F.pdf
  • Vesić, D., Sánchez Monroe, J., & Vesić, S. L. (2022). Cyber security and protection against high-tech crime. Seti IV – Fourth International Scientific Conference – Science, Education, Technology and Innovation, (pp. 91-98). Belgrade: International Research Academy of Science and Art
  • Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, pp. 97–102. https://doi.org/10.1016/j.cose.2013.04.004
  • Xiang, Y., Wang, L., & Liu, N. (2017). Coordinated attacks on electric power systems in a cyber-physicalenvironment. Electric Power Systems Research, 149, pp. 156–168. https://doi.org/10.1016/j.epsr.2017.04.023
  • Žegarac, Z. (1998). Infrastruktura [Infrastructure]. Beograd. Geografski fakultet: Urbanistički zavod
Еще
Статья научная