IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v36y2022ics1874548221000858.html
   My bibliography  Save this article

Cyber-threat landscape of border control infrastructures

Author

Listed:
  • Chatzis, Petros
  • Stavrou, Eliana

Abstract

Various events in recent decades, such as the 9/11 tragedy and the European migration crisis, have highlighted the critical nature of robust borders and the impact of associated attacks on their integrity. However, it is unclear as to the extent to which cyber-attacks can threaten border operations. Interestingly, no extensive research has been conducted into this topic, possibly due to the complexity and diversity of border controls. This paper specifies the cyber-threat landscape of border control infrastructures to assist professionals in assessing the relevant cybersecurity risks. Border control infrastructures are complex environments and relevant risks might not be easily identified. To investigate the cyber-threat landscape of these infrastructures, a mixed research method, combining qualitative and quantitative results, and using border-related expert interviews and risk analysis investigation was chosen. Key contributions of this work include the classification of a widespread set of border assets, the description of the profiles of threat actors and their potential synergies, the specification of a threat taxonomy applicable to all border types, and the identification of potential areas of vulnerability. Moreover, through the risk analysis investigations, exemplary input is developed to guide professionals while applying a risk assessment methodology in the context of border control infrastructures. The paper concludes with future directions addressed to policy makers and border professionals.

Suggested Citation

  • Chatzis, Petros & Stavrou, Eliana, 2022. "Cyber-threat landscape of border control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
  • Handle: RePEc:eee:ijocip:v:36:y:2022:i:c:s1874548221000858
    DOI: 10.1016/j.ijcip.2021.100503
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548221000858
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2021.100503?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. M.‐Elisabeth Paté‐Cornell & Marshall Kuypers & Matthew Smith & Philip Keller, 2018. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 226-241, February.
    2. Genge, Béla & Kiss, István & Haller, Piroska, 2015. "A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 10(C), pages 3-17.
    3. Gemma Galdon Clavell, 2017. "Protect rights at automated borders," Nature, Nature, vol. 543(7643), pages 34-36, March.
    Full references (including those not matched with items on IDEAS)

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    2. Maria Polorecka & Jozef Kubas & Pavel Danihelka & Katarina Petrlova & Katarina Repkova Stofkova & Katarina Buganova, 2021. "Use of Software on Modeling Hazardous Substance Release as a Support Tool for Crisis Management," Sustainability, MDPI, vol. 13(1), pages 1-15, January.
    3. Hayes, Darren R. & Cappa, Francesco, 2018. "Open-source intelligence for risk assessment," Business Horizons, Elsevier, vol. 61(5), pages 689-697.
    4. Siwar Kriaa & Marc Bouissou & Youssef Laarouchi, 2019. "A new safety and security risk analysis framework for industrial control systems," Journal of Risk and Reliability, , vol. 233(2), pages 151-174, April.
    5. González, Santiago G. & Dormido Canto, S. & Sánchez Moreno, José, 2020. "Obtaining high preventive and resilience capacities in critical infrastructure by industrial automation cells," International Journal of Critical Infrastructure Protection, Elsevier, vol. 29(C).
    6. Mark Bentley & Alec Stephenson & Peter Toscas & Zili Zhu, 2020. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk," Risks, MDPI, vol. 8(2), pages 1-21, June.
    7. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    8. Stright, Jim & Cheetham, Peter & Konstantinou, Charalambos, 2022. "Defensive cost–benefit analysis of smart grid digital functionalities," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    9. Qianxiang Zhu & Yuanqing Qin & Chunjie Zhou & Weiwei Gao, 2018. "Extended multilevel flow model-based dynamic risk assessment for cybersecurity protection in industrial production systems," International Journal of Distributed Sensor Networks, , vol. 14(6), pages 15501477187, June.
    10. Galbraith, John W. & Iuliani, Luca, 2019. "Measures of robustness for networked critical infrastructure: An empirical comparison on four electrical grids," International Journal of Critical Infrastructure Protection, Elsevier, vol. 27(C).
    11. Adrian-Silviu Roman, 2023. "Evaluating the Privacy and Utility of Time-Series Data Perturbation Algorithms," Mathematics, MDPI, vol. 11(5), pages 1-21, March.
    12. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    13. Ahmed Shokry & Piero Baraldi & Andrea Castellano & Luigi Serio & Enrico Zio, 2021. "Identification of Critical Components in the Complex Technical Infrastructure of the Large Hadron Collider Using Relief Feature Ranking and Support Vector Machines," Energies, MDPI, vol. 14(18), pages 1-19, September.
    14. Leszczyna, Rafał, 2018. "Standards on cyber security assessment of smart grid," International Journal of Critical Infrastructure Protection, Elsevier, vol. 22(C), pages 70-89.
    15. Todor Tagarev & Valeri Ratchev, 2020. "A Taxonomy of Crisis Management Functions," Sustainability, MDPI, vol. 12(12), pages 1-34, June.
    16. Palleti, Venkata Reddy & Joseph, Jude Victor & Silva, Arlindo, 2018. "A contribution of axiomatic design principles to the analysis and impact of attacks on critical infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 23(C), pages 21-32.
    17. Alberto Sardi & Enrico Sorano, 2019. "Dynamic Performance Management: An Approach for Managing the Common Goods," Sustainability, MDPI, vol. 11(22), pages 1-22, November.
    18. Bhandari, Pratik & Creighton, Douglas & Gong, Jinzhe & Boyle, Carol & Law, Kris M.Y., 2023. "Evolution of cyber-physical-human water systems: Challenges and gaps," Technological Forecasting and Social Change, Elsevier, vol. 191(C).
    19. Natalie M. Scala & Allison C. Reilly & Paul L. Goethals & Michel Cukier, 2019. "Risk and the Five Hard Problems of Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 39(10), pages 2119-2126, October.
    20. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:36:y:2022:i:c:s1874548221000858. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.