Cybersecurity Issues in Industrial Critical Infrastructure Annotated Bibliography

Exclusively available on Available only on IvyPanda®
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment

Ani, U. P. D., He, H. M., & Tiwari, A. (2017). . Journal of Cyber Security Technology, 1(1), 32-74.

This source addresses the current advanced industries in terms of their vulnerability to cyberattacks. As the progress continues, humanity relies more on new technologies and the Internet. As a result, the necessity of protecting the critical infrastructure becomes more topical, calling for effective solutions in terms of protecting the data and functionality of the critical infrastructure.

Carter, W. A., & Sofio, D. G. (2017). . In M. J. Alperen (Ed.), Foundations of homeland security: Law and policy (2nd ed.), John Wiley & Sons.

The authors of this piece argue that security was never a central feature of the Internet. Today, as private and public organizations, including the entities of critical infrastructure, increase their reliance on worldwide web-based technologies, this aspect becomes more evident. As a result, major transformations are required to ensure the cybersecurity of society.

Cassotta, S., & Sidortsov, R. (2019). Cybersecurity in the energy sector: are we really prepared? Journal of Energy & Natural Resources Law, 39(3), 265-270.

The rapid digitalization of the global community mostly has a positive impact, enhancing the potential of various industries, including the energy sector. However, new opportunities render the grids subject to damaging cyberattacks. The authors of this article argue in favor of new, coherent, and cohesive risk-centered policies that encompass both the cybersecurity and environmental domains of the energy sector.

Dagoumas, A. (2019). . Energies, 12(4).

For the global power systems, cybersecurity becomes the leading matter of concern. This piece of knowledge discusses the uncertainty of renewable energy systems, based on several Unit Commitments models. This way, the author analyzes the potential impact of various cybersecurity threats capable of interrupting the stability of the supply of energy to communities and industries.

De Peralta, F. A., Gorton, A. M., Watson, M., Bays, R. M., Castleberry, J. E., Boles, J. E., Gorton, B. T., & Powers, F. E. (2020). . Pacific Northwest National Laboratory.

This report prepared for the United States Department of Energy explains the theoretical foundations behind the increased demand for marine renewable energy. While this technology is advanced and safe for the environment, such systems face additional threats in terms of cybersecurity. Based on the analysis of the present risks, the authors provide an outline of a framework that addresses both internal and external threats in light of the system design and security architecture.

Jarmakiewicz, J., Parobczak, K., & Maślanka, K. (2017). . International Journal of Critical Infrastructure Protection, 18, 20-33.

The central idea of the article revolves around the fact that modern energy grids do not exist in isolation. Web-based technology ensures their interconnection and links with the centers of decision-making, enhancing the efficiency and control potential. Considering the increased attention of cyber terrorists to such advanced energy systems, this paper proposes an effective approach to protecting this element of critical infrastructure against malicious attempts.

Kline, C. (2021). Journal of Homeland Security and Emergency Management, 18(2), 215-218.

This article investigates the impact of damaging events on the functioning of the critical elements of the energy infrastructure. Cyberattacks remain one of the leading threats to stable operations within the sector. The author the writer argues in favor of a modernized approach to increase the resilience of the power systems that will ensure a full recovery within 15 calendar days and mitigate the overall risks for the population.

Leszczyna, R. (2018). Computers & Security, 77, 262-276.

According to this article, the general trend in the energy sector aims at introducing smart grids to regulate the power supply with a better degree of efficiency. The present situation requires new, comprehensive cybersecurity standards that can be applied on nationwide and global levels to address the existing threats. The author provides the outline of such standards that can enhance the resilience of power systems in the face of new cyber threats.

Leszczyna, R. (2019). Cybersecurity in the electricity sector: Managing critical infrastructure. Springer Nature.

This book is devoted entirely to the history and new avenues of cybersecurity in the energy sector. The author recognizes power systems as integral elements of the critical infrastructure of modern communities, thus implying a stronger need for effective cybersecurity frameworks. Comparing the current situation with emerging threats, this book provides an evidence-based outline of the potential developments within the industry.

Massel, A., & Gaskova, D. (2018). Scenario approach for analyzing extreme situations in energy from a cybersecurity perspective. Industry 4.0, 3(5), 266-269.

This piece of writing emphasizes the importance of precise forecasting in establishing the cybersecurity of the energy sector. More specifically, instead of waiting for the attacks to occur to draw meaningful conclusions, policy-makers can rely on the construction of probabilistic scenarios to anticipate such situations. The proposed framework relies on the Bayesian networks to construct such scenarios and assess the threats at all stages.

Mengidis, N., Tsikira, T., Vrochidis, S., & Kompatsiaris, I. (2019). . Information & Security, 43(1), 21-33.

This article discusses the use of renewable energy as the future of global power systems. As these methods are more technologically advanced, they become subject to increased cyber threats. Thus, the potential methods of mitigation should be equally advanced, which includes the important role of artificial intelligence and blockchain technology in cybersecurity architecture design.

Radvanovsky, R. S., & McDougall, A. (2018). Critical infrastructure (4th ed.). Taylor & Francis.

This book represents the central pillar of knowledge in regards to the discussed issues. Radvanovsky and McDougall (2018) discuss the concept of the critical infrastructure at length, including the presenting risks and the importance of their mitigation. Based on these insights, the direction of subsequent research can be developed upon a solid theoretical foundation.

Rosson, J., Rice, M., Lopez, J., & Fass, D. (2019). Incentivizing cyber security investment in the power sector using an extended cyber insurance framework. Homeland Security Affairs, 15(2), 1-24.

This report addresses the observed gap in the cybersecurity aspect of the energy sector. The combined knowledge of the Infrastructure Security Agency and private entities reveals that the scale and unpredictability of cyberattacks on power systems pose major reasons for concern. An effective protection model is proposed, the simulation tests of which have demonstrated sufficient results for the enhancement of the cybersecurity architecture in this critical industry.

Smith, D. C. (2021). . Energy Research & Social Science, 51, 129-133.

As per this piece of knowledge, cyberspace becomes an area of warfare in the current environment. Advanced nations face increasing threats posed by both internal and external adversaries, targeting their critical infrastructure. In this regard, the article outlines the key avenues for building the preparedness and resilience of power grids under the circumstances of constant, unpredictable threats.

Sullivan, J. E., & Kamensky, D. (2017). The Electricity Journal, 30(3), 30–35.

The current landscape possesses several prominent examples of intricate cyberattack plots against entire nations’ power systems. This article discusses the case of the Ukrainian capital to highlight the potential impact of such attacks on communities. The methodology and technical aspects of the attacks are discussed to provide the key avenues of prevention for the future.

United States Government Accountability Office. (2021).

This governmental report is the key to understanding the state’s position on cyberthreats to the critical infrastructure. An investigation has revealed that many entities of vital industries do not have effective contingency plans in case of a full-scale cyberattack. This information highlights the importance of addressing the matter on a nationwide level through practice-based techniques and interagency collaboration.

Venkatachary, S. K., Prasad, J., Samikannu, R., Alagappan, A., & Andrews, L. J. B. (2020). . Journal of Statistics and Management Systems, 23(2), 263-276.

The authors of this paper discuss the critical role of the energy sector in today’s businesses and communities. Even the smallest interruptions of the power supply can undermine the normal functioning of society in the 21st century. Thus, the resilience of the sector is essential for the sustainable development of humanity. The Internet of Things is discussed as one of the technologies that becomes critical for all aspects of its cybersecurity.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, October 31). Cybersecurity Issues in Industrial Critical Infrastructure. https://ivypanda.com/essays/cybersecurity-issues-in-industrial-critical-infrastructure/

Work Cited

"Cybersecurity Issues in Industrial Critical Infrastructure." IvyPanda, 31 Oct. 2022, ivypanda.com/essays/cybersecurity-issues-in-industrial-critical-infrastructure/.

References

IvyPanda. (2022) 'Cybersecurity Issues in Industrial Critical Infrastructure'. 31 October.

References

IvyPanda. 2022. "Cybersecurity Issues in Industrial Critical Infrastructure." October 31, 2022. https://ivypanda.com/essays/cybersecurity-issues-in-industrial-critical-infrastructure/.

1. IvyPanda. "Cybersecurity Issues in Industrial Critical Infrastructure." October 31, 2022. https://ivypanda.com/essays/cybersecurity-issues-in-industrial-critical-infrastructure/.


Bibliography


IvyPanda. "Cybersecurity Issues in Industrial Critical Infrastructure." October 31, 2022. https://ivypanda.com/essays/cybersecurity-issues-in-industrial-critical-infrastructure/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1