Accès libre

The Multidimensional Impact on Society of Cyber Attacks Targeting the Energy Critical Infrastructure Sector

À propos de cet article

Citez

Alshathry, S. (2017). Cyber Attack on Saudi Aramco. International Journal of Management and Information Technology, Vol. 11, Issue 5. Search in Google Scholar

Australian Government. Australian Cyber Security Centre (ACSC). (n.d.). Available at: https://www.cyber.gov.au/node/933. Search in Google Scholar

Bing, C. (2018). Trisis has the security world spooked, stumped and searching for answers. CIBERSCOOP. https://www.cyberscoop.com/trisis-ics-malware-saudi-arabia/. Search in Google Scholar

Centre for the Protection of National Infrastructure. (2021). Critical National Infrastructure. Available at: https://www.cpni.gov.uk/critical-national-infrastructure-0. Search in Google Scholar

Cyberint Research. (2020). Targeted Ransomware Attacks in Taiwan. Available at: https://blog.cyberint.com/targeted-ransomware-attacks-in-taiwan. Search in Google Scholar

Cybersecurity & Infrastructure Security Agency (CISA). (2020). Critical Infrastructure Sectors. Available at: https://www.cisa.gov/critical-infrastructure-sectors. Search in Google Scholar

Cybersecurity and Infrastructure Security Agency (CISA). (n.d.). Sector Risk Management Agencies. Available at: https://www.cisa.gov/sector-risk-management-agencies. Search in Google Scholar

Doan, L. (2021). Colonial Is Just the Latest Energy Asset Hit by Cyber-Attack. Available at: https://www.bloomberg.com/news/articles/2021-05-08/colonial-is-just-the-latest-energy-asset-hit-by-cyberattacks. Search in Google Scholar

Dragos Inc. (2017). TRISIS Malware – Analysis of Safety System Targeted Malware version 1.20171213. Available at: https://www.dragos.com/wp-content/uploads/TRISIS-01.pdf. Search in Google Scholar

European Commission – Directorate-General for Humanitarian Aid and Civil Protection. (2015). Resilience of Critical Infrastructure Protection. Available at: https://ec.europa.eu/echo/sites/default/files/recipe_guidelines.pdf. Search in Google Scholar

Ferris, N., & Renssen van, S. (2021). Cybersecurity threats escalate in the energy sector. Available at: https://energymonitor.ai/tech/digitalisation/cybersecurity-threats-escalate-in-the-energy-sector. Search in Google Scholar

Gonzalez, G., Lefebvre, B., & Geller, E. (2021). Jugular’ of the U.S. fuel pipeline system shuts down after cyberattack. Available at: https://www.politico.com/news/2021/05/08/colonial-pipeline-cyber-attack-485984. Search in Google Scholar

Government of Romania. (2010). Ordonanța de urgență nr. 98/2010 privind identificarea, desemnarea și protecția infrastructurilor critice. Available at: http://legislatie.just.ro/Public/DetaliiDocument/123547. Search in Google Scholar

ICS-CRT, IR-ALERT-H-16-056-01. (2021). Cyber-Attack against Ukrainian Critical Infrastructure. Available at: https://us-cert.cisa.gov/ics/alerts/IR-ALERT-H-16-056-01. Search in Google Scholar

Kaspersky, ICS CERT (2021). DarkChronicles: the consequences of the Colonial Pipeline attack. Available at: https://ics-cert.kaspersky.com/reports/2021/05/21/darkchronicles-the-consequences-of-the-colonial-pipeline-attack/#_Toc72509154. Search in Google Scholar

Korean Nuclear Plant Faces Data Leak and Destruction. (2014). Available at: https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/korean-nuclear-plant-faces-data-leak-and-destruction. Search in Google Scholar

Larson, A. (2014). Korea Hydro and Nuclear Power Co. Hacked. In News & Technology for the Global Energy Industry. Available at: https://www.powermag.com/korea-hydro-and-nuclear-power-co-hacked/. Search in Google Scholar

Lee, R.M., Assante, M.J., & Conway, T. (2016). Analysis of the Cyber Attack on the Ukrainian Power Grid. Available at: https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2016/05/20081514/E-ISAC_SANS_Ukraine_DUC_5.pdf. Search in Google Scholar

Lewis, J.A. (2006). Cybersecurity and Critical Infrastructure Protection. Center for Strategic and International Studies, available at: http://csis-website-prod.s3.amazonaws.com/s3fs-public/legacy_files/files/media/csis/pubs/0601_cscip_preliminary.pdf. Search in Google Scholar

Lockheed Martin Corporation. (2015). Seven Ways to Apply the Cyber Kill Chain® with a Threat Intelligence Platform. Available at: https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/Seven_Ways_to_Apply_the_Cyber_Kill_Chain_with_a_Threat_Intelligence_Platform.pdf. Search in Google Scholar

Macola, I.M. (2020). The five worst cyberattacks against the power industry since 2014. Available at: https://www.power-technology.com/features/the-five-worst-cyberattacks-against-the-power-industry-since2014/. Search in Google Scholar

Miková, T. (2018). Cyber Attack on Ukrainian Power Grid. Available at: https://is.muni.cz/th/uok5b/BP_Mikova_final.pdf. Search in Google Scholar

Min, J. (2017). North Korea’s Asymmetric Attack on South Korea’s Nuclear Power Plants, Introduction to Nuclear Energy. PH241 – Stanford University, available at: http://large.stanford.edu/courses/2017/ph241/min1/. Search in Google Scholar

Ministry of Internal Affairs National Centre for Coordination of Critical Infrastructure Protection (n.d.). Available at: https://cncpic.mai.gov.ro/. Search in Google Scholar

Olive N.L.G. (2013). Cybersecurity: The Nation’s Greatest Threat to Critical Infrastructure. Strategy Research Project. Available at: https://www.hsdl.org/?view&did=815446, accessed on 09 November 2021. Search in Google Scholar

Organisation for Economic Co-operation and Development (OECD). (2019). Good Governance for Critical Infrastructure Resilience. OECD Reviews of Risk Management Policies, Paris: OECD Publishing, available at: https://www.oecd.org/fr/gov/risques/workshop-oecd-jrc-system-thinking-for-critical-infrastructure-resilience-and-security.htm. Search in Google Scholar

Public Safety Canada. (2015). Role of Critical Infrastructure in National Prosperity. Critical 5. Available at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2016-rlcrtclnfrstrctr-ntnlprsprty/index-en.aspx. Search in Google Scholar

Public Safety Canada. (2020). Information Sharing for National Security. Available at: https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cntr-trrrsm/shrng-ns-nfrmtn-en.aspx. Search in Google Scholar

Public Safety Canada. (2021). National Strategy for Critical Infrastructure. Available at: https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/index-en.aspx. Search in Google Scholar

Reshmi, T.R. (2021). Information security breaches due to ransomware attacks – a systematic literature review. International Journal of Information Management Data Insights, Vol.1, Issue 2.10.1016/j.jjimei.2021.100013 Search in Google Scholar

Rimmey, D.L. (2017). Critical Infrastructure and Key Resources. Available at: https://www.nfhs.org/media/1018359/infrastructure-2017.pdf. Search in Google Scholar

Senate and House of Representatives of the United States of America in Congress assembled. (2001). Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (Usa Patriot Act) Act of 2001. Public Law 107-56-OCT. 26, 2001, available at: https://www.congress.gov/107/plaws/publ56/PLAW-107publ56.pdf. Search in Google Scholar

Smith, D.C. (2021). Cybersecurity in the energy sector: are we really prepared?. Journal of Energy & Natural Resources Law, Vol. 39, Issue 3, 265-270, available at: https://www.tandfonline.com/doi/full/10.1080/02646811.2021.1943935. Search in Google Scholar

The MITRE Corporation. (2015). Overview of How Cyber Resiliency Affects the Cyber Attack Lifecycle. Available at: http://www2.mitre.org/public/industry-perspective/documents/lifecycle-ex.pdf. Search in Google Scholar

Thomas A. J. (edit.) (2015). CyberSecurity. Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare, CRC Press, Taylor and Francis Group, 57-58. Search in Google Scholar

Weinberg, A. (2021). Analysis of top 11 cyber attacks on critical infrastructure. Available at: https://www.firstpoint-mg.com/blog/analysis-of-top-11-cyber-attackson-critical-infrastructure/. Search in Google Scholar

Yergin, D. (2011). The Quest. Energy, Security, and the Remaking of the Modern World. New York: The Penguin Press. Search in Google Scholar

Zetter, K. (2016). Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid, Wired. Available at: https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/. Search in Google Scholar