IDEAS home Printed from https://ideas.repec.org/p/hal/journl/hal-02919624.html
   My bibliography  Save this paper

Cyber effect and security management aspects in critical energy infrastructures

Author

Listed:
  • Tomas Plėta

    (Mykolas Romeris University)

  • Manuela Tvaronavičienė

    (Vilnius Gediminas Technical University, General Jonas Žemaitis Military Academy of Lithuania)

  • Silvia Della Casa

    (NATO Energy Security Centre of Excellence)

Abstract

The purpose of the paper is to compare various types of management models that regulate the response to cyber threats to Critical Infrastructures. The development of an effective management model that regulates the response to cyber-attack against Critical Infrastructure is an important issue in security management. Many frameworks attempt to regulate the response that has to be done to recover and eradicate possible threats, but still, there is not a universal appliable model for all Critical Infrastructures. The paper will offer a comparison of various frameworks in an attempt of evaluating the features that a hypothetical model for response to Cyber Incidents to Critical Infrastructures. The focus is on Critical Energy Infrastructure, as their damage directly means damage to other critical infrastructures, given their extreme interconnectivity. After the analysis of five frameworks of responses to Cyber Incidents, an evaluation will be provided, along with a recommendation.

Suggested Citation

  • Tomas Plėta & Manuela Tvaronavičienė & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Post-Print hal-02919624, HAL.
  • Handle: RePEc:hal:journl:hal-02919624
    DOI: 10.9770/IRD.2020.2.2(3)
    Note: View the original document on HAL open archive server: https://hal.science/hal-02919624
    as

    Download full text from publisher

    File URL: https://hal.science/hal-02919624/document
    Download Restriction: no

    File URL: https://libkey.io/10.9770/IRD.2020.2.2(3)?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    References listed on IDEAS

    as
    1. Tadas Limba & Tomas Plėta & Konstantin Agafonov & Martynas Damkus, 2017. "Cyber security management model for critical infrastructure," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 4(4), pages 559-573, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Emil Velinov & Milan Maly & Yelena Petrenko & Igor Denisov & Vasko Vassilev, 2020. "The Role of Top Management Team Digitalization and Firm Internationalization for Sustainable Business," Sustainability, MDPI, vol. 12(22), pages 1-11, November.
    2. Kamila Borseková & Jaroslav Klátik & Samuel Koróny & Peter Krištofík & Peter Mihók & Martin Orviský, 2020. "Sustainable Policy Measures Based on Implementation of Digital Technologies in Corrections: Exploratory Study from Slovakia and Beyond," Sustainability, MDPI, vol. 12(20), pages 1-18, October.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Tomas PlÄ—ta & Manuela TvaronaviÄ ienÄ— & Manuela TvaronaviÄ ienÄ— & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Insights into Regional Development, VsI Entrepreneurship and Sustainability Center, vol. 2(2), pages 538-548, June.
    2. Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Post-Print hal-01706905, HAL.
    3. Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 5(2), pages 368-402, December.

    More about this item

    Keywords

    critical infrastructure; management; cyber-attack; energy security; Cybersecurity;
    All these keywords.

    NEP fields

    This paper has been announced in the following NEP Reports:

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hal:journl:hal-02919624. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: CCSD (email available below). General contact details of provider: https://hal.archives-ouvertes.fr/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.