1. bookVolume 26 (2021): Issue 1 (March 2021)
Journal Details
License
Format
Journal
First Published
15 Mar 2017
Publication timeframe
4 times per year
Languages
English
access type Open Access

Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors

Published Online: 05 Mar 2021
Page range: 69 - 75
Journal Details
License
Format
Journal
First Published
15 Mar 2017
Publication timeframe
4 times per year
Languages
English

The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.

Keywords

Bhattacharjee, S., Salimitari, M., Chatterjee, M., Kwiat, K., & Kamhoua, C. (2017, November). Preserving data integrity in iot networks under opportunistic data manipulation. IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech), 446-453.Search in Google Scholar

Bracho, A., Saygin, C., Wan, H., Lee, Y., & Zarreh, A. (2018). A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manufacturing, Vol. 26, 1116-1127.Search in Google Scholar

Copos, B., Levitt, K., Bishop, M., & Rowe, J. (2016, May). Is anybody home? Inferring activity from smart home network traffic. IEEE Security and Privacy Workshops (SPW), 245-251.Search in Google Scholar

Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, Vol. 10, Issue 1, 19-28.Search in Google Scholar

Denning, D.E. (2012). Stuxnet: What has changed?. Future Internet, Vol. 4, Issue 3, 672-687.Search in Google Scholar

Department of Homeland Security. (2014). Section 10(a) and 10(b) Report on the United States Coast Guard (USCG) and Maritime Critical Infrastructure Cybersecurity Standards, Section 10(b) Report on the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS). Section 10(b) Report on the Transportation Security Administration’s (TSA’s) Approach to Voluntary Industry Adoption of the NIST. Author.Search in Google Scholar

Friedman, A.A., Mack-Crane, A., & Hammond, R.A. (2013). Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences. Center for Technology Innovation at Brookings.Search in Google Scholar

Ge, X., Ye, J., Yang, Y., & Li, Q. (2016). User mobility evaluation for 5G small cell networks based on individual mobility model. IEEE Journal on Selected Areas in Communications, Vol. 34, Issue 3, 528-541.Search in Google Scholar

Lewis, J.A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies.Search in Google Scholar

Lewis, B.K. (2012). Social Media and Strategic Communications: Attitudes and perceptions Among College Students (Doctoral Dissertation). ProQuest Dissertations and Thesis Full Texts Database. Oklahoma State University, available at: http://www.prsa.org/Intelligence/PRJournal/Documents/2012LewisNichols.pdf, accessed on 13 September 2020.Search in Google Scholar

Lichtman, M., Rao, R., Marojevic, V., Reed, J., & Jover, R. P. (2018, May). 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE International Conference on Communications Workshops (ICC Workshops), 1-6.Search in Google Scholar

Munro, K. (2012). Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, Vol. 10, 8-11.Search in Google Scholar

National Institute of Standards and Technology (NIST). (2014). Framework for Improving Critical Infrastructure Cybersecurity. United States of America.Search in Google Scholar

Obama, B. (2013). Executive order 13636: Improving critical infrastructure cybersecurity. Federal Register, Vol. 78, Issue 33, 11739.Search in Google Scholar

Robles, R.J., Choi, M.K., Cho, E.S., Kim, S.S., Park, G., & Lee, J. (2008). Common threats and vulnerabilities of critical infrastructures. International Journal of Control and Automation, Vol. 1, Issue 1, 17-22.Search in Google Scholar

Tang, L., Jing, K., He, J., & Stanley, H. E. (2016). Complex interdependent supply chain networks: Cascading failure and robustness. Physica A: Statistical Mechanics and its Applications, Vol. 443, 58-69.Search in Google Scholar

The White House. (2014). Assessing Cybersecurity Regulations. Available at: http://m.whitehouse.gov/blog/2014/05/22/assessing-cybersecurity-regulations, accessed on 14 September 2020Search in Google Scholar

Ullah, H., Nair, N.G., Moore, A., Nugent, C., Muschamp, P., & Cuevas, M. (2019). 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access, Vol. 7, 37251-37268Search in Google Scholar

Wells, L.J., Camelio, J.A., Williams, C.B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, Vol. 2, Issues 2, 74-77.Search in Google Scholar

Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. Cyberterrorism, 123-136.Search in Google Scholar

Recommended articles from Trend MD

Plan your remote conference with Sciendo