Cyber Threat Landscape in Energy Sector

被引:0
|
作者
Kovanen, Tiina [1 ]
Nuojua, Viivi [1 ]
Lehto, Martti [2 ]
机构
[1] Univ Jyvaskyla, Jyvaskyla, Finland
[2] Univ Jyvaskyla, Cybersecur, Fac Informat Technol, Jyvaskyla, Finland
关键词
cyber security; energy; threat; critical infrastructure; smart grid;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Energy, in its many forms, is vital for modern society. It is not just the electricity we get from the plug but it contains the varied production methods and the means to bring it to the end-users whether they are industries, traffic or homes. If this chain is broken and energy cannot be distributed, the results are complicated. Especially, the lack of electricity tests the reserve power production capabilities in hospitals and in other critical infrastructures. Readiness plans have to be kept up to date and rehearsed regularly in order to keep them effective. This requires information of the changes in security scenarios based on new emerged threats. Energy sector is facing new opportunities as smart grid solutions provide possibilities for more efficient energy production, transmission and distribution. However, new risks arise from connectivity and automation. Bringing remote access to systems that are not designed for it security-wise, aids adversaries to reach their goals undetected. We have seen cyber risks actualizing and having an effect on our physical world. In addition to causing inconvenience in society's basic functionalities, intentional power outages also shatter the sense of security. This is why national and international research projects are formed around this topic. From Finland's perspective, interest in smart and flexible energy systems is very high. In addition, our energy production is quite distributed, and there are numerous operators on the market. Because of that, we need to consider the cyber threats in national level. There are studies and models on how to prepare for these events or even better how to prevent them. We wish to see how realistic these models are against real-world scenarios. We survey and analyze current publicly known cyber-attacks against actors in energy sector and compare the kill chain, adversaries and impacts. We also explore mitigation strategies for future scenarios based on the findings of our analysis. The result describes current energy sector cyber threat landscape. It provides information to security solution developers in business but also in national level. Results can be seen as a baseline for future trend comparisons.
引用
收藏
页码:353 / 361
页数:9
相关论文
共 50 条
  • [31] Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2021, 10 (03) : 1 - 19
  • [32] THE 'LANDSCAPE OF THREAT'
    SAIL, L
    POETRY REVIEW, 1995, 85 (01): : 27 - 27
  • [33] Faking Smart Industry: A Honeypot-Driven Approach for Exploring Cyber Security Threat Landscape
    Rashid, S. M. Zia Ur
    Haq, Ashfaqul
    Hasan, Sayed Tanimun
    Furhad, Md Hasan
    Ahmed, Mohiuddin
    Ullah, Abu S. S. M. Barkat
    COGNITIVE RADIO ORIENTED WIRELESS NETWORKS AND WIRELESS INTERNET, 2022, 427 : 307 - 324
  • [34] Navigating the Cyber Threat Landscape: An In-Depth Analysis of Attack Detection within IoT Ecosystems
    AboulEla, Samar
    Ibrahim, Nourhan
    Shehmir, Sarama
    Yadav, Aman
    Kashef, Rasha
    AI, 2024, 5 (02) : 704 - 732
  • [35] The water lily and the cyber cow, landscape as a platform for Education for Sustainability in the higher education sector
    Whitbread, Helen
    CURRENT OPINION IN ENVIRONMENTAL SUSTAINABILITY, 2015, 16 : 22 - 28
  • [36] Unraveling the dynamics of the cyber threat landscape: Major shifts examined through the recent societal events
    Song, Uihyeon
    Hur, Gimin
    Lee, Sangjin
    Park, Jungheum
    SUSTAINABLE CITIES AND SOCIETY, 2024, 103
  • [37] Limits to a cyber-threat
    Emerson, R. Guy
    CONTEMPORARY POLITICS, 2016, 22 (02) : 178 - 196
  • [38] Beating back the cyber threat
    Fowler, David
    Engineer, 2018, 298 (7895): : 34 - 35
  • [39] Defending against the cyber threat
    Zolfagharifard, Ellie
    Engineer, 2010, 1-NOVEMBER
  • [40] Modeling Cyber Threat Intelligence
    Bromander, Siri
    Swimmer, Morton
    Eian, Martin
    Skjotskift, Geir
    Borg, Fredrik
    ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280