The Cyber Threat to National Critical Infrastructures: Beyond Theory

被引:13
|
作者
Geers, Kenneth [1 ]
机构
[1] Naval Criminal Investigat Serv NCIS, Cooperat Cyber Def Ctr Excellence, 12 Filtri St, EE-10132 Tallinn, Estonia
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 01期
关键词
business continuity and disaster recover planning; critical; cyber; Estonia; infrastructure; security architecture and design; telecommunications and network security threat;
D O I
10.1080/19393550802676097
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain level of real-world disorder can be achieved from hostile data packets alone. The astonishing achievements of cyber crime and cyber espionage - to which law enforcement and counterintelligence have found little answer - hint that more serious cyber attacks on critical infrastructures are only a matter of time. Still, national security planners should address all threats with method and objectivity. As dependence on IT and the Internet grow, governments should make proportional investments in network security, incident response, technical training, and international collaboration.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [1] Open Source Intelligence Base Cyber Threat Inspection Framework for Critical Infrastructures
    Lee, Seokcheol
    Shon, Taeshik
    [J]. PROCEEDINGS OF 2016 FUTURE TECHNOLOGIES CONFERENCE (FTC), 2016, : 1030 - 1033
  • [2] Big Data Analysis Techniques for Cyber-Threat Detection in Critical Infrastructures
    Hurst, William
    Merabti, Madjid
    Fergus, Paul
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 916 - 921
  • [3] Cyber security of critical infrastructures
    Maglaras, Leandros A.
    Kim, Ki-Hyung
    Janicke, Helge
    Ferrag, Mohamed Amine
    Rallis, Stylianos
    Fragkou, Pavlina
    Maglaras, Athanasios
    Cruz, Tiago J.
    [J]. ICT EXPRESS, 2018, 4 (01): : 42 - 45
  • [4] Measuring Cyber Resilience of IoT-Enabled Critical National Infrastructures
    Adewumi, Adeola
    Hammoudeh, Mohammad
    Dargahi, Tooska
    Jogunola, Olamide
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY WORKSHOPS, PT I, ACNS 2024-AIBLOCK 2024, AIHWS 2024, AIOTS 2024, SCI 2024, AAC 2024, SIMLA 2024, LLE 2024, AND CIMSS 2024, 2024, 14586 : 265 - 280
  • [5] Critical Threat of Critical Infrastructures: The Human Factor
    Lazanyi, Kornelia
    Danaj, Adela
    [J]. SECURITY-RELATED ADVANCED TECHNOLOGIES IN CRITICAL INFRASTRUCTURE PROTECTION: THEORETICAL AND PRACTICAL APPROACH, 2022, : 1 - 11
  • [6] Anti-social networking: crowdsourcing and the cyber defence of national critical infrastructures
    Johnson, Chris W.
    [J]. ERGONOMICS, 2014, 57 (03) : 419 - 433
  • [7] Cyber Security of Networked Critical Infrastructures
    Abu-Nimeh, Saed
    Foo, Ernest
    Fovino, Igor Nai
    Govindarasu, Manimaran
    Morris, Thomas
    [J]. IEEE NETWORK, 2013, 27 (01): : 3 - 4
  • [8] Cyber-threat landscape of border control infrastructures
    Chatzis, Petros
    Stavrou, Eliana
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 36
  • [9] Threat Awareness for Critical Infrastructures Resilience
    Gouglidis, Antonios
    Green, Benjamin
    Busby, Jeremy
    Rouncefield, Mark
    Hutchison, David
    Schauer, Stefan
    [J]. PROCEEDINGS OF 2016 8TH INTERNATIONAL WORKSHOP ON RESILIENT NETWORKS DESIGN AND MODELING (RNDM), 2016, : 196 - 202
  • [10] Extensible threat taxonomy for critical infrastructures
    Luiijf, H. A. M.
    Nieuwenhuijs, A. H.
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2008, 4 (04) : 409 - 417