Cargando…
Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure
Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interrupti...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145335/ https://www.ncbi.nlm.nih.gov/pubmed/37112400 http://dx.doi.org/10.3390/s23084060 |
_version_ | 1785034308881219584 |
---|---|
author | Riggs, Hugo Tufail, Shahid Parvez, Imtiaz Tariq, Mohd Khan, Mohammed Aquib Amir, Asham Vuda, Kedari Vineetha Sarwat, Arif I. |
author_facet | Riggs, Hugo Tufail, Shahid Parvez, Imtiaz Tariq, Mohd Khan, Mohammed Aquib Amir, Asham Vuda, Kedari Vineetha Sarwat, Arif I. |
author_sort | Riggs, Hugo |
collection | PubMed |
description | Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service disruptions. Furthermore, extensive data breaches have compromised the personally identifiable information of millions of people. This paper aims to summarize some of the major cyber attacks that have occurred in the past 20 years against critical infrastructures. These data are gathered in order to analyze the types of cyber attacks, their consequences, vulnerabilities, as well as the victims and attackers. Cybersecurity standards and tools are tabulated in this paper in order to address this issue. This paper also provides an estimate of the number of major cyber attacks that will occur on critical infrastructure in the future. This estimate predicts a significant increase in such incidents worldwide over the next five years. Based on the study’s findings, it is estimated that over the next 5 years, 1100 major cyber attacks will occur on critical infrastructures worldwide, each causing more than USD 1 million in damages. |
format | Online Article Text |
id | pubmed-10145335 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-101453352023-04-29 Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure Riggs, Hugo Tufail, Shahid Parvez, Imtiaz Tariq, Mohd Khan, Mohammed Aquib Amir, Asham Vuda, Kedari Vineetha Sarwat, Arif I. Sensors (Basel) Review Several critical infrastructures are integrating information technology into their operations, and as a result, the cyber attack surface extends over a broad range of these infrastructures. Cyber attacks have been a serious problem for industries since the early 2000s, causing significant interruptions to their ability to produce goods or offer services to their clients. The thriving cybercrime economy encompasses money laundering, black markets, and attacks on cyber-physical systems that result in service disruptions. Furthermore, extensive data breaches have compromised the personally identifiable information of millions of people. This paper aims to summarize some of the major cyber attacks that have occurred in the past 20 years against critical infrastructures. These data are gathered in order to analyze the types of cyber attacks, their consequences, vulnerabilities, as well as the victims and attackers. Cybersecurity standards and tools are tabulated in this paper in order to address this issue. This paper also provides an estimate of the number of major cyber attacks that will occur on critical infrastructure in the future. This estimate predicts a significant increase in such incidents worldwide over the next five years. Based on the study’s findings, it is estimated that over the next 5 years, 1100 major cyber attacks will occur on critical infrastructures worldwide, each causing more than USD 1 million in damages. MDPI 2023-04-17 /pmc/articles/PMC10145335/ /pubmed/37112400 http://dx.doi.org/10.3390/s23084060 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Riggs, Hugo Tufail, Shahid Parvez, Imtiaz Tariq, Mohd Khan, Mohammed Aquib Amir, Asham Vuda, Kedari Vineetha Sarwat, Arif I. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title | Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title_full | Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title_fullStr | Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title_full_unstemmed | Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title_short | Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure |
title_sort | impact, vulnerabilities, and mitigation strategies for cyber-secure critical infrastructure |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10145335/ https://www.ncbi.nlm.nih.gov/pubmed/37112400 http://dx.doi.org/10.3390/s23084060 |
work_keys_str_mv | AT riggshugo impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT tufailshahid impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT parvezimtiaz impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT tariqmohd impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT khanmohammedaquib impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT amirasham impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT vudakedarivineetha impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure AT sarwatarifi impactvulnerabilitiesandmitigationstrategiesforcybersecurecriticalinfrastructure |