Author
Listed:
- Venkatachary, Sampath Kumar
- Prasad, Jagdish
- Alagappan, Annamalai
- Andrews, Leo John Baptist
- Raj, Raymon Antony
- Duraisamy, Sarathkumar
Abstract
This paper comprehensively reviews the challenges posed by cybersecurity and cyber-terrorism to energy-related infrastructures. The article highlights the difficulty in monitoring, managing, and measuring cybersecurity threats and discuss the critical need for analysis in this area, particularly in the energy sector, where control and command operations are conducted in an internetworked environment. Despite the energy industry's effective risk management practices, it remains vulnerable to cyber-terrorism, as evidenced by the Stuxnet attack. This hardware-software co-designed mechanism targeted Iranian nuclear facilities. The authors explore the technical aspects of Stuxnet and its impact on the energy sector, emphasising the need for proactive measures to mitigate the risks posed by cyber-terrorism. The economic implications of cyberattacks on energy infrastructures are also discussed, including the potential for significant financial losses and reputational damage. The authors provide practical guidance on preventive measures and defence mechanisms, such as network segmentation, access control, and encryption, to help prevent cyberattacks. In a nutshell, this paper serves as a timely and insightful reminder of the ongoing challenges faced by energy-related infrastructures in cybersecurity and cyber-terrorism. It underscores the need to continue developing effective risk management strategies and implementing appropriate measures to protect against cyber threats.
Suggested Citation
Venkatachary, Sampath Kumar & Prasad, Jagdish & Alagappan, Annamalai & Andrews, Leo John Baptist & Raj, Raymon Antony & Duraisamy, Sarathkumar, 2024.
"Cybersecurity and cyber-terrorism challenges to energy-related infrastructures – Cybersecurity frameworks and economics – Comprehensive review,"
International Journal of Critical Infrastructure Protection, Elsevier, vol. 45(C).
Handle:
RePEc:eee:ijocip:v:45:y:2024:i:c:s1874548224000180
DOI: 10.1016/j.ijcip.2024.100677
Download full text from publisher
As the access to this document is restricted, you may want to
for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:45:y:2024:i:c:s1874548224000180. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.