CYBER SECURITY OF A CRITICAL INFRASTRUCTURE
DOI:
https://doi.org/10.5937/ptp2302077VKeywords:
security, cyber security, critical infrastructure, cyber attacksAbstract
A critical infrastructure consists of basic assets and facilities whose functioning has a significant impact on the society and economy of a country, as well as on its security. The life and work of the citizens of a country are largely dependent on a smooth operation of various energy, telecommunication, water and sewage facilities, as well as the network of hospitals and health institutions, transportation, etc. The safe functioning of these systems is a prerequisite for the existence and development of a social community in an area. Therefore, it is necessary to undertake all necessary activities to preserve a critical infrastructure both in reality and cyberspace. With the development of the Internet, there has been a transformation of people’s work and life in the broadest sense, in such a way that it has become an indispensable part of everyday life of each of us. Together with the largest global network increasingly used as well as the various services people necessarily being relied on in the new reality the world encountered during the COVID-10 pandemic, there has been created a vast space attracting the malicious users. They act by using the known mechanisms of functioning communication networks and other information technologies, finding the system vulnerabilities and exploit them. In this paper, we will analyze the cyber security of a critical infrastructure, cyber attacks on a critical infrastructure and the measures needed to be taken to mitigate the consequences of cyber attacks.
References
Alagappan, A., Baptist, L. J., Venkatachary, S. K., Samikannu, R., Prasad, J., & Immaculate, A. (2020). Impact of Biological Pandemic in Critical Infrastructure Services – Are We Heading for a Cyber Pandemic? European Journal of Molecular & Clinical Medicine, 7(3), pp. 5154–5177
Alladi, T., Chamola, V., & Zeadally, S. (2020). Industrial Control Systems: Cyberattack Trends and Countermeasures. Computer Communications, 155, pp. 1–8. https://doi.org/10.1016/j.comcom.2020.03.007
Australian Cyber and Infrastructure Security Centre. (2023). Defining critical infrastructure. Downloaded 2023, February 26 from https://www.cisc.gov.au/what-is-the-cyber-and-infrastructure-security-centre/defining-critical-infrastructure
Bjelajac, Ž. Đ., & Jovanović, M. B. (2013). Pojedini aspekti bezbednosne kulture na Internetu [Certain aspects of security culture on the Internet]. Kultura polisa, 10(21), pp. 99–114.
Bjelajac, Ž., & Filipović, A. (2020). Internet Addiction Disorder (IAD) as a Paradigm of Lack of Security Culture. Kultura polisa, 17 (43), pp. 239-258
Bjelajac, Ž. Đ., & Vesić, S. L. (2020). Security of information systems. Pravo – teorija i praksa, 37(2), pp. 63–76. https://doi.org/10.5937/ptp2002063b
Chen, P., Desmet, L., & Huygens, C. (2014). A study on Advanced Persistent Threats. In: Decker, B. De & Zúquete, A. (eds.), Communications and Multimedia Security. CMS 2014. Lecture Notes in Computer Science, (pp. 63-72), Springer Berlin Heidelberg, https://doi.org/10.1007/978-3-662-44885-4_5
Crowdstrike. (2023). What is an Advanced Persistent Threat? Cybersecurity 101. Downloaded 2023, March 10 from https://www.crowdstrike.com/cybersecurity-101/advanced-persistent-threat-apt/
Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the Future of Cyber War. Survival, 51(1), pp. 23–40. https://doi.org/10.1080/00396338.2011.555586
García Zaballos, A., & Jeun, I. (2016).Best Practices for Critical Information Infrastructure Protection (CIIP): Experiences from Latin America and the Caribbean and Selected Countries. Inter-American Development Bank
Holloway, M. (2015). Slammer Worm and David-Besse Nuclear Plant. Downloaded 2023, March 15 from http://large.stanford.edu/courses/2015/ph241/holloway2/
IBM Security. (2021). Cost of a Data Breach Report 2021
IBM Security. (2022). Cost of a Data Breach Report 2022
Lukić, B. (2005). Uloga infrastrukture u prostornom razvoju Srbije – doktorska disertacija [The role of infrastructure in the spatial development of Serbia – doctoral dissertation]. Beograd: Geografski fakultet, Univerzitet u Beogradu
Milosavljević, B., & Vučinić, D. (2021). Odnos prema kritičnoj infrastrukturi u Republici Srbiji [Attitude towards critical infrastructure in the Republic of Serbia].Vojno delo, 73(4), pp. 42-56.https://doi.org/10.5937/vojdelo2104042M
NIST. (2022). critical infrastructure. Committee on National Security Systems (CNSS) Glossary. Downloaded 2023, February 20 from https://csrc.nist.gov/glossary/term/critical_infrastructure
OECD. (n.d.). Multiple hazards and threats can disrupt critical infrastructure. Downloaded April 21, 2023, from https://www.oecd-ilibrary.org/sites/76326acb-en/index.html?itemId=/content/component/76326acb-en
Pranggono, B., & Arabo, A. (2021). COVID-19 pandemic cybersecurity issues. Internet Technoogy Letters, 4(2), pp. 1–6. https://doi.org/10.1002/itl2.247
Public Safety Canada. (2022). Renewing Canada’s Approach to Critical Infrastructure Resilience: What We Heard Report. Downloaded 2023, February 15 from https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/rnwng-cnd-pprch-crtcl-nfrstrctr-rslnc-2022/rnwng-cnd-pprch-crtclnfrstrctr-rslnc-2022-en.pdf
Stošić, L. V., & Janković, A. V. (2022). Cybercrime in the Republic of Serbia: Prevalence, situation and perspectives. Kultura polisa, 19(4), pp. 82–99. https://doi.org/10.51738/Kpolisa2022.19.4r.82sj
Stouffer, K., Pillitteri, V., Lightman, S., Abrams, M., & Hahn, A. (2015). Special Publication 800-82 Revision 2 – Guide to Industrial Control Systems (ICS) Security. Downloaded 2023, February 25 from https://doi.org/10.6028/NIST.SP.800-82r2
Trbojević, M. (2018). Zaštita kritičnih infrastruktura – iskustva tranzicionih zemalja [Protection of critical infrastructures – experiences of transition countries]. Politička revija, 56(2), pp. 99–118. https://doi.org/10.22182/pr.5622018.5
Vericlave. (2018). The Kemuri Water Company Hack. Downloaded 2023, February 25 from https://www.vericlave.com/wp-content/uploads/2018/10/Vericlave_WhitePaper_KemuriWater_1018_F.pdf
Vesić, D., Sánchez Monroe, J., & Vesić, S. L. (2022). Cyber security and protection against high-tech crime. Seti IV – Fourth International Scientific Conference – Science, Education, Technology and Innovation, (pp. 91-98). Belgrade: International Research Academy of Science and Art
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. Computers and Security, 38, pp. 97–102. https://doi.org/10.1016/j.cose.2013.04.004
Xiang, Y., Wang, L., & Liu, N. (2017). Coordinated attacks on electric power systems in a cyber-physicalenvironment. Electric Power Systems Research, 149, pp. 156–168. https://doi.org/10.1016/j.epsr.2017.04.023
Žegarac, Z. (1998). Infrastruktura [Infrastructure]. Beograd. Geografski fakultet: Urbanistički zavod
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Slavimir Vesić, Martin Bjelajac

This work is licensed under a Creative Commons Attribution 4.0 International License.






