[
Alshathry, S. (2017). Cyber Attack on Saudi Aramco. International Journal of Management and Information Technology, Vol. 11, Issue 5.
]Search in Google Scholar
[
Australian Government. Australian Cyber Security Centre (ACSC). (n.d.). Available at: https://www.cyber.gov.au/node/933.
]Search in Google Scholar
[
Bing, C. (2018). Trisis has the security world spooked, stumped and searching for answers. CIBERSCOOP. https://www.cyberscoop.com/trisis-ics-malware-saudi-arabia/.
]Search in Google Scholar
[
Centre for the Protection of National Infrastructure. (2021). Critical National Infrastructure. Available at: https://www.cpni.gov.uk/critical-national-infrastructure-0.
]Search in Google Scholar
[
Cyberint Research. (2020). Targeted Ransomware Attacks in Taiwan. Available at: https://blog.cyberint.com/targeted-ransomware-attacks-in-taiwan.
]Search in Google Scholar
[
Cybersecurity & Infrastructure Security Agency (CISA). (2020). Critical Infrastructure Sectors. Available at: https://www.cisa.gov/critical-infrastructure-sectors.
]Search in Google Scholar
[
Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). Sector Risk Management Agencies. Available at: https://www.cisa.gov/sector-risk-management-agencies.
]Search in Google Scholar
[
Doan, L. (2021). Colonial Is Just the Latest Energy Asset Hit by Cyber-Attack. Available at: https://www.bloomberg.com/news/articles/2021-05-08/colonial-is-just-the-latest-energy-asset-hit-by-cyberattacks.
]Search in Google Scholar
[
Dragos Inc. (2017). TRISIS Malware – Analysis of Safety System Targeted Malware version 1.20171213. Available at: https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf.
]Search in Google Scholar
[
European Commission – Directorate-General for Humanitarian Aid and Civil Protection. (2015). Resilience of Critical Infrastructure Protection. Available at: https://ec.europa.eu/echo/sites/default/files/recipe_guidelines.pdf.
]Search in Google Scholar
[
Ferris, N., & Renssen van, S. (2021). Cybersecurity threats escalate in the energy sector. Available at: https://energymonitor.ai/tech/digitalisation/cybersecurity-threats-escalate-in-the-energy-sector.
]Search in Google Scholar
[
Gonzalez, G., Lefebvre, B., & Geller, E. (2021). Jugular’ of the U.S. fuel pipeline system shuts down after cyberattack. Available at: https://www.politico.com/news/2021/05/08/colonial-pipeline-cyber-attack-485984.
]Search in Google Scholar
[
Government of Romania. (2010). Ordonanța de urgență nr. 98/2010 privind identificarea, desemnarea și protecția infrastructurilor critice. Available at: http://legislatie.just.ro/Public/DetaliiDocument/123547.
]Search in Google Scholar
[
ICS-CRT, IR-ALERT-H-16-056-01. (2021). Cyber-Attack against Ukrainian Critical Infrastructure. Available at: https://us-cert.cisa.gov/ics/alerts/IR-ALERT-H-16-056-01.
]Search in Google Scholar
[
Kaspersky, ICS CERT (2021). DarkChronicles: the consequences of the Colonial Pipeline attack. Available at: https://ics-cert.kaspersky.com/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/#_Toc72509154.
]Search in Google Scholar
[
Korean Nuclear Plant Faces Data Leak and Destruction. (2014). Available at: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/korean-nuclear-plant-faces-data-leak-and-destruction.
]Search in Google Scholar
[
Larson, A. (2014). Korea Hydro and Nuclear Power Co. Hacked. In News & Technology for the Global Energy Industry. Available at: https://www.powermag.com/korea-hydro-and-nuclear-power-co-hacked/.
]Search in Google Scholar
[
Lee, R.M., Assante, M.J., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Available at: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf.
]Search in Google Scholar
[
Lewis, J.A. (2006). Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International Studies, available at: http://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/0601_cscip_preliminary.pdf.
]Search in Google Scholar
[
Lockheed Martin Corporation. (2015). Seven Ways to Apply the Cyber Kill Chain® with a Threat Intelligence Platform. Available at: https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.pdf.
]Search in Google Scholar
[
Macola, I.M. (2020). The five worst cyberattacks against the power industry since 2014. Available at: https://www.power-technology.com/features/the-five-worst-cyberattacks-against-the-power-industry-since2014/.
]Search in Google Scholar
[
Miková, T. (2018). Cyber Attack on Ukrainian Power Grid. Available at: https://is.muni.cz/th/uok5b/BP_Mikova_final.pdf.
]Search in Google Scholar
[
Min, J. (2017). North Korea’s Asymmetric Attack on South Korea’s Nuclear Power Plants, Introduction to Nuclear Energy. PH241 – Stanford University, available at: http://large.stanford.edu/courses/2017/ph241/min1/.
]Search in Google Scholar
[
Ministry of Internal Affairs National Centre for Coordination of Critical Infrastructure Protection (n.d.). Available at: https://cncpic.mai.gov.ro/.
]Search in Google Scholar
[
Olive N.L.G. (2013). Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure. Strategy Research Project. Available at: https://www.hsdl.org/?view&did=815446, accessed on 09 November 2021.
]Search in Google Scholar
[
Organisation for Economic Co-operation and Development (OECD). (2019). Good Governance for Critical Infrastructure Resilience. OECD Reviews of Risk Management Policies, Paris: OECD Publishing, available at: https://www.oecd.org/fr/gov/risques/workshop-oecd-jrc-system-thinking-for-critical-infrastructure-resilience-and-security.htm.
]Search in Google Scholar
[
Public Safety Canada. (2015). Role of Critical Infrastructure in National Prosperity. Critical 5. Available at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2016-rlcrtclnfrstrctr-ntnlprsprty/index-en.aspx.
]Search in Google Scholar
[
Public Safety Canada. (2020). Information Sharing for National Security. Available at: https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/shrng-ns-nfrmtn-en.aspx.
]Search in Google Scholar
[
Public Safety Canada. (2021). National Strategy for Critical Infrastructure. Available at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/index-en.aspx.
]Search in Google Scholar
[
Reshmi, T.R. (2021). Information security breaches due to ransomware attacks – a systematic literature review. International Journal of Information Management Data Insights, Vol.1, Issue 2.10.1016/j.jjimei.2021.100013
]Search in Google Scholar
[
Rimmey, D.L. (2017). Critical Infrastructure and Key Resources. Available at: https://www.nfhs.org/media/1018359/infrastructure-2017.pdf.
]Search in Google Scholar
[
Senate and House of Representatives of the United States of America in Congress assembled. (2001). Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (Usa Patriot Act) Act of 2001. Public Law 107-56-OCT. 26, 2001, available at: https://www.congress.gov/107/plaws/publ56/PLAW-107publ56.pdf.
]Search in Google Scholar
[
Smith, D.C. (2021). Cybersecurity in the energy sector: are we really prepared?. Journal of Energy & Natural Resources Law, Vol. 39, Issue 3, 265-270, available at: https://www.tandfonline.com/doi/full/10.1080/02646811.2021.1943935.
]Search in Google Scholar
[
The MITRE Corporation. (2015). Overview of How Cyber Resiliency Affects the Cyber Attack Lifecycle. Available at: http://www2.mitre.org/public/industry-perspective/documents/lifecycle-ex.pdf.
]Search in Google Scholar
[
Thomas A. J. (edit.) (2015). CyberSecurity. Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, CRC Press, Taylor and Francis Group, 57-58.
]Search in Google Scholar
[
Weinberg, A. (2021). Analysis of top 11 cyber attacks on critical infrastructure. Available at: https://www.firstpoint-mg.com/blog/analysis-of-top-11-cyber-attackson-critical-infrastructure/.
]Search in Google Scholar
[
Yergin, D. (2011). The Quest. Energy, Security, and the Remaking of the Modern World. New York: The Penguin Press.
]Search in Google Scholar
[
Zetter, K. (2016). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid, Wired. Available at: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/.
]Search in Google Scholar