Show simple item record

dc.contributor.authorAbouzakhar, Nasser
dc.date.accessioned2014-03-04T15:29:05Z
dc.date.available2014-03-04T15:29:05Z
dc.date.issued2013-07-12
dc.identifier.citationAbouzakhar , N 2013 , ' Critical Infrastructure Cybersecurity : A Review of Recent Threats and Violations ' Paper presented at 12th European Conf on Cyber Warfare and Security , Finland , 11/07/13 - 12/07/13 , pp. 1-10 .
dc.identifier.citationconference
dc.identifier.otherPURE: 2819464
dc.identifier.otherPURE UUID: b6098425-4c82-43c0-841c-ad90a4b60d80
dc.identifier.otherScopus: 84893467980
dc.identifier.urihttp://hdl.handle.net/2299/12999
dc.description.abstractMost of current industries and their critical infrastructure rely heavily on the Internet for everything. The increase in the online services and operations for various industries has led to an increase in different security threats and malicious activities. In US, the department of homeland security reported recently that there have been 200 attacks on core critical infrastructures in the transportation, energy, and communication industries (Erwin et al., 2012). This paper is concerned with the growing dependence of modern society on the Internet, which has become an ideal channel and vital source of malicious activities and various security threats. These threats could have an impact on different distributed systems within and across all the critical infrastructures, such as industrial networks, financial online systems and services, nuclear power generation and control systems, airlines and railway traffic controllers, satellite communication networks, national healthcare information systems … etc. The major problem is that the existing Internet mechanisms and protocols are not appropriately designed to deal with such recently developed problems. Therefore, a rigorous research is required to develop security approaches and technologies that are capable of responding to this new evolving context. This paper presents various security threats and incidents over the past recent years on different critical infrastructure domains. It introduces some security measures including vulnerability assessment and penetration testing approaches for critical infrastructure.en
dc.format.extent11
dc.language.isoeng
dc.relation.ispartof
dc.rights/dk/atira/pure/core/openaccesspermission/open
dc.subjectCritical infrastructure protection, cyber security, security threats and violations
dc.titleCritical Infrastructure Cybersecurity : A Review of Recent Threats and Violationsen
dc.contributor.institutionCentre for Computer Science and Informatics Research
dc.contributor.institutionSchool of Computer Science
dc.contributor.institutionScience & Technology Research Institute
dc.description.statusPeer reviewed
dc.relation.schoolSchool of Computer Science
dc.description.versiontypeFinal Accepted Version
rioxxterms.versionAM
rioxxterms.typeOther
herts.preservation.rarelyaccessedtrue
herts.rights.accesstypeopenAccess


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record