Towards protecting critical infrastructures
Authors
Abstract
Critical Infrastructures (CIs) provide an uncountable number of essential services able to support the global economy and also our current way of life. Services such as power distribution, transport networks, telecommunications, the Internet, among others, are now an integral part of the citizens’ lives and businesses. These types of infrastructures are referred to as “Critical” due to the fact that in case of failure or breakdown in providing quality of service, the impact on society and the economy of a country can be enormous.CIs are particularly exposed to a growing number of threats including natural disasters and equipment failure. CIs are also attracting interest from groups of hackers and terrorists, primarily due to the strong visibility and consequences that may result even from a small successful attack. Information and Communication Technology (ICT) security plays a major role in CI protection and risk prevention for single and also for interconnected CIs were cascading effects might occur because of the interdependencies that exist among different CIs.
This chapter addresses Critical Infrastructure Protection (CIP) paying particular attention to the risk alert exchange among CIs. The main result obtained from the MICIE Project are discussed along with the mechanisms that manage and measure, the degree of confidence assigned to risk alerts generated or received by CIs in order to improve risk alerts accuracy and consequently improve the resilience of CIs when faced with inaccurate or inconsistent risk alerts. An on-going project that followed MICIE is also presented. CockpitCI Project aims to improve the resilience and dependability of Critical Infrastructures through the automatic detection of cyber-threats and the sharing of real-time information about attacks among CI Owners. CockpitCI addresses one of the fundamental MICIE’s shortcomings by adding SCADA-oriented security detection capabilities, which provide input to models for risk prediction and assessment of the operational status of the Industrial Control Systems (ICSs).
Keywords
Critical Infrastructure Protection, ICT security, Trust and Reputation Management, Intrusion Detection Systems, SCADA; HoneyPotsRelated Project
FP7 CockpitCI: Cybersecurity on SCADA: risk prediction, analysis and reaction tools for Critical InfrastructuresBook Chapter
Cybersecurity Policies and Strategies for Cyberwarfare Prevention, 7, pp. 123-169, IGI-Global, July 2015DOI
Cited by
Year 2019 : 2 citations
van Niekerk, Brett. "Economic Information Warfare: Classifying Cyber-Attacks Against Commodity Value Chains." International Conference on Cyber Warfare and Security. Academic Conferences International Limited, 2019.
Sö?üt, Esra & Erdem, Ayhan. (2019). A Review of Research Studies on Cyber Terror. In book: Applying Methods of Scientific Inquiry Into Intelligence, Security, and Counterterrorism. DOI: 10.4018/978-1-5225-8976-1.ch008
Year 2018 : 2 citations
Piero Siroli, Gian. (2018). Considerations on the Cyber Domain as the New Worldwide Battlefield. The International Spectator. 53. 111-123. DOI:10.1080/03932729.2018.1453583.
Yu-Min Joo & Teck-Boon Tan (2018) Smart Cities: A New Age of Digital Insecurity, Survival, 60:2, 91-106, DOI: 10.1080/00396338.2018.1448577. URL (full paper): http://scholarbank.nus.sg/bitstream/10635/141601/1/10.108000396338.2018.1448577.pdf
Year 2017 : 2 citations
Roger A. Hallman, Jose Romero-Mariona, et al., "Standardized and Repeatable Technology Evaluation for Cybersecurity Acquisition", SPAWAR Systems Pacific Technical Document 3316, February 2017. Available at: https://www.researchgate.net/profile/Roger_Hallman2/publication/316976845_Standardized_and_Repeatable_Technology_Evaluation_for_Cybersecurity_Acquisition/links/591b3e214585153b614fa208/Standardized-and-Repeatable-Technology-Evaluation-for-Cybersecurity-Acquisition.pdf
Kasemsap, K. "Robotics: Theory and Applications." In Cybersecurity Breaches and Issues Surrounding Online Threat Protection, pp. 311-345. IGI Global, 2017. DOI: 10.4018/978-1-5225-1941-6.ch013