Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures

被引:4
|
作者
Tsantikidou, Kyriaki [1 ]
Sklavos, Nicolas [1 ]
机构
[1] Univ Patras, Comp Engn & Informat Dept, SCYTALE Grp, Patras 26504, Greece
关键词
Critical Infrastructures; cybersecurity; cryptography; threats and attacks; mitigation; smart health; Internet of Things (IoT); SCADA; HEALTH-CARE; IOT; SECURITY; SYSTEMS; COMMUNICATION; CYBERATTACKS; INTERNET;
D O I
10.3390/cryptography8010007
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them. Nevertheless, they have become increasingly vulnerable to cyber threats and attacks in recent years. The main reason is their inability to quickly adapt to technological changes, employ updated cryptographic frameworks, and implement a thoroughly secure architecture based on their characteristics. In this study, the unique complexities of these systems are highlighted. Various verified cyberattacks that were executed against CIs in recent years are analyzed. Moreover, the general framework of CIs is demonstrated together with the employed technologies and cryptographic primitives. A thorough architecture of said technologies is developed to better understand the targeted components and easily identify potentially hidden threats. Afterwards, threat, adversary, and attack models that target critical systems and services are designed. The purpose is a better comprehension of the systems' vulnerabilities, attack structures, motives, and targets for assisting CIs' designers in creating secure frameworks and mechanisms, with the ability to mitigate such threats. Lastly, security controls and cryptography frameworks are demonstrated together with efficient mitigation architectures and implementations from the research community.
引用
收藏
页数:24
相关论文
共 50 条
  • [41] Critical Infrastructures: IT Security and Threats from Private Sector Ownership
    Warfield, Douglas
    INFORMATION SECURITY JOURNAL, 2012, 21 (03): : 127 - 136
  • [42] FOREIGN DIRECT INVESTMENT IN AN ERA OF INCREASED THREATS TO CRITICAL INFRASTRUCTURES
    Assaf, Dan
    CRITICAL INFRASTRUCTURE PROTECTION IV, 2010, 342 : 17 - 27
  • [43] A safer future: Leveraging the AI power to improve the cybersecurity in critical infrastructures
    Volk, Mojca
    ELEKTROTEHNISKI VESTNIK, 2024, 91 (03): : 73 - 94
  • [44] Functional cyber-resilience - Extending the cybersecurity paradigm in critical infrastructures
    de Haan, Johannes
    2023 IEEE/ACM 4TH INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS, ENCYCRIS, 2023, : 17 - 22
  • [45] Cybersecurity-aware log management system for critical water infrastructures
    Balta, Deniz Dural
    Kac, Seda Balta
    Balta, Musa
    Ogur, Nur Banu
    Eken, Suleyman
    APPLIED SOFT COMPUTING, 2025, 169
  • [46] Layered structures of robustness and resilience: Evidence from cybersecurity projects for critical infrastructures in Central Europe
    Maurer, Florian
    Fritzsche, Albrecht
    STRATEGIC CHANGE-BRIEFINGS IN ENTREPRENEURIAL FINANCE, 2023, 32 (06): : 195 - 208
  • [47] Ransomware attacks detection methodology to protect IoT-enabled critical infrastructures
    Mishra, Amit Kumar
    Obaidat, Mohammad S.
    Bhajpai, Harshit
    Trivedi, Pranjal
    Wazid, Mohammad
    Singh, D. P.
    Rodrigues, Joel J. P. C.
    Sadoun, Balqies
    IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 6037 - 6042
  • [48] The Insecurity of Innovation: A Critical Analysis of Cybersecurity in the United States
    Hart, Catherine
    Jin, Dal Yong
    Feenberg, Andrew
    International Journal of Communication, 2014, 8 : 2860 - 2878
  • [49] Cybersecurity Challenges in Smart Grid Systems: Current and Emerging Attacks, Opportunities, and Recommendations
    Amanlou, Sanaz
    Hasan, Mohammad Kamrul
    Mokhtar, Umi Asma
    Malik, Khalid Mahmood
    Islam, Shayla
    Khan, Sheroz
    Khan, Muhammad Attique
    Khan, Muhammad Asghar
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2025, 6 : 1965 - 1997
  • [50] Fifteen Deadly Cybersecurity Threats Aimed Covid-19
    Alaboudi, Abdulellah A.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2021, 21 (12): : 123 - 130