Digital Transformation in Energy Sector: Cybersecurity Challenges and Implications

被引:4
作者
Saeed, Saqib [1 ]
Gull, Hina [1 ]
Aldossary, Muneera Mohammad [1 ]
Altamimi, Amal Furaih [1 ]
Alshahrani, Mashael Saeed [1 ]
Saqib, Madeeha [1 ]
Iqbal, Sardar Zafar [1 ]
Almuhaideb, Abdullah M. [2 ]
机构
[1] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Comp Informat Syst, POB 1982, Dammam 31441, Saudi Arabia
[2] Imam Abdulrahman Bin Faisal Univ, Coll Comp Sci & Informat Technol, SAUDI ARAMCO Cybersecur Chair, Dept Networks & Commun, POB 1982, Dammam 31441, Saudi Arabia
关键词
cybersecurity; digital transformation; energy sector automation; risk assessment; operations;
D O I
10.3390/info15120764
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Digital transformation in energy sector organizations has huge benefits but also exposes them to cybersecurity challenges. In this paper, we carried out a systematic literature review on cybersecurity challenges and issues in the energy domain. Energy-associated assets are very critical for any nation and cyber-attacks on these critical infrastructures can result in strategic, financial, and human losses. We investigated research papers published between 2019 and 2024 and categorized our work into three domains: oil and gas sector, the electricity sector, and the nuclear energy sector. Our study highlights that there is a need for more research in this important area to improve the security of critical infrastructures in the energy sector. We have outlined research directions for the scientific community to further strengthen the body of knowledge. This work is important for researchers to identify key areas to explore as well as for policymakers in energy sector organizations to improve their security operations by understanding the associated implications of cybersecurity.
引用
收藏
页数:21
相关论文
共 100 条
[1]   Case-based learning in the management practice of information security: an innovative pedagogical instrument [J].
Ahmad A. ;
Maynard S.B. ;
Motahhir S. ;
Anderson A. .
Personal and Ubiquitous Computing, 2021, 25 (05) :853-877
[2]  
Akberdina Victoria, 2021, E3S Web of Conferences, V250, DOI 10.1051/e3sconf/202125006001
[3]  
Al Obaidan F., 2021, Handbook of Research on Advancing Cybersecurity for Digital Transformation, P203
[4]   Metaheuristics with deep learning driven phishing detection for sustainable and secure environment [J].
Alohali, Manal Abdullah ;
Alasmari, Naif ;
Maashi, Mashael ;
Nouri, Amal M. ;
Rizwanullah, Mohammed ;
Yaseen, Ishfaq ;
Osman, Azza Elneil ;
Alneil, Amani A. .
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2023, 56
[5]  
Alqurashi RK, 2020, International Journal, V9, P217, DOI [10.30534/ijatcse/2020/33912020, DOI 10.30534/IJATCSE/2020/33912020]
[6]   A Review of Recent Advances, Challenges, and Opportunities in Malicious Insider Threat Detection Using Machine Learning Methods [J].
Alzaabi, Fatima Rashed ;
Mehmood, Abid .
IEEE ACCESS, 2024, 12 :30907-30927
[7]   Case-based learning for cybersecurity leaders: A systematic review and research agenda [J].
Anderson, Ashley ;
Ahmad, Atif ;
Chang, Shanton .
INFORMATION & MANAGEMENT, 2024, 61 (07)
[8]  
[Anonymous], About us
[9]  
[Anonymous], about us
[10]  
Aubuchon T., 2006, P SPE INT OIL GAS C, pSPE