Have a personal or library account? Click to login
Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors Cover

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors

Open Access
|Mar 2021

References

  1. Bhattacharjee, S., Salimitari, M., Chatterjee, M., Kwiat, K., & Kamhoua, C. (2017, November). Preserving data integrity in iot networks under opportunistic data manipulation. IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 446-453.10.1109/DASC-PICom-DataCom-CyberSciTec.2017.87
  2. Bracho, A., Saygin, C., Wan, H., Lee, Y., & Zarreh, A. (2018). A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manufacturing, Vol. 26, 1116-1127.10.1016/j.promfg.2018.07.148
  3. Copos, B., Levitt, K., Bishop, M., & Rowe, J. (2016, May). Is anybody home? Inferring activity from smart home network traffic. IEEE Security and Privacy Workshops (SPW), 245-251.10.1109/SPW.2016.48
  4. Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, Vol. 10, Issue 1, 19-28.
  5. Denning, D.E. (2012). Stuxnet: What has changed?. Future Internet, Vol. 4, Issue 3, 672-687.10.3390/fi4030672
  6. Department of Homeland Security. (2014). Section 10(a) and 10(b) Report on the United States Coast Guard (USCG) and Maritime Critical Infrastructure Cybersecurity Standards, Section 10(b) Report on the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS). Section 10(b) Report on the Transportation Security Administration’s (TSA’s) Approach to Voluntary Industry Adoption of the NIST. Author.
  7. Friedman, A.A., Mack-Crane, A., & Hammond, R.A. (2013). Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences. Center for Technology Innovation at Brookings.
  8. Ge, X., Ye, J., Yang, Y., & Li, Q. (2016). User mobility evaluation for 5G small cell networks based on individual mobility model. IEEE Journal on Selected Areas in Communications, Vol. 34, Issue 3, 528-541.10.1109/JSAC.2016.2525439
  9. Lewis, J.A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies.
  10. Lewis, B.K. (2012). Social Media and Strategic Communications: Attitudes and perceptions Among College Students (Doctoral Dissertation). ProQuest Dissertations and Thesis Full Texts Database. Oklahoma State University, available at: http://www.prsa.org/Intelligence/PRJournal/Documents/2012LewisNichols.pdf, accessed on 13 September 2020.
  11. Lichtman, M., Rao, R., Marojevic, V., Reed, J., & Jover, R. P. (2018, May). 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE International Conference on Communications Workshops (ICC Workshops), 1-6.10.1109/ICCW.2018.8403769
  12. Munro, K. (2012). Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, Vol. 10, 8-11.10.1016/S1361-3723(12)70102-1
  13. National Institute of Standards and Technology (NIST). (2014). Framework for Improving Critical Infrastructure Cybersecurity. United States of America.
  14. Obama, B. (2013). Executive order 13636: Improving critical infrastructure cybersecurity. Federal Register, Vol. 78, Issue 33, 11739.
  15. Robles, R.J., Choi, M.K., Cho, E.S., Kim, S.S., Park, G., & Lee, J. (2008). Common threats and vulnerabilities of critical infrastructures. International Journal of Control and Automation, Vol. 1, Issue 1, 17-22.
  16. Tang, L., Jing, K., He, J., & Stanley, H. E. (2016). Complex interdependent supply chain networks: Cascading failure and robustness. Physica A: Statistical Mechanics and its Applications, Vol. 443, 58-69.10.1016/j.physa.2015.09.082
  17. The White House. (2014). Assessing Cybersecurity Regulations. Available at: http://m.whitehouse.gov/blog/2014/05/22/assessing-cybersecurity-regulations, accessed on 14 September 2020
  18. Ullah, H., Nair, N.G., Moore, A., Nugent, C., Muschamp, P., & Cuevas, M. (2019). 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access, Vol. 7, 37251-3726810.1109/ACCESS.2019.2905347
  19. Wells, L.J., Camelio, J.A., Williams, C.B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, Vol. 2, Issues 2, 74-77.10.1016/j.mfglet.2014.01.005
  20. Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. Cyberterrorism, 123-136.10.1007/978-1-4939-0962-9_7
DOI: https://doi.org/10.2478/raft-2021-0011 | Journal eISSN: 3100-5071 | Journal ISSN: 3100-5063
Language: English
Page range: 69 - 75
Published on: Mar 5, 2021
Published by: Nicolae Balcescu Land Forces Academy
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2021 Maurice Dawson, Robert Bacius, Luis Borges Gouveia, Andreas Vassilakos, published by Nicolae Balcescu Land Forces Academy
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.