Emerging and Future Cyber Threats to Critical Systems

被引:0
作者
Djambazova, Edita [1 ]
Almgren, Magnus [2 ]
Dimitrov, Kiril [1 ]
Jonsson, Erland [2 ]
机构
[1] Inst Parallel Proc BAS, Sofia, Bulgaria
[2] Chalmers Univ, Gothenburg, Sweden
来源
OPEN RESEARCH PROBLEMS IN NETWORK SECURITY | 2011年 / 6555卷
关键词
SECURITY;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper discusses the emerging and future cyber threats to critical systems identified during the EU/FP7 project ICT-FORWARD. Threats were identified after extensive discussions with both domain experts and IT security professionals from academia, industry, and government organizations. The ultimate goal of the work was to identify the areas in which cyber threats could occur and cause serious and undesirable consequences, based on the characteristics of critical systems. A model of a critical system is suggested and used to distill a list of cyber threats specific to such systems. The impact of the identified threats is illustrated by an example scenario in order to stress the risks and consequences that the materialization of such threats could entail. Finally, we discuss possible solutions and security measures that could be developed and implemented to mitigate the situation.
引用
收藏
页码:29 / +
页数:3
相关论文
共 21 条
  • [11] ICT FORWARD Project, 2010, DEL D3 1 WHIT BOOK E
  • [12] Kagan H, 2008, INTERVIEW WIRELESS D
  • [13] Keeney Michelle., 2005, INSIDER THREAT STUDY
  • [14] Kim R.-H., 2008, EFFICIENT IP TRACEBA
  • [15] NIST SP800-82, 2008, NIST
  • [16] NSTAC, 2006, NEXT GEN NETW TASK F
  • [17] Security in wireless sensor networks
    Perrig, A
    Stankovic, J
    Wagner, D
    [J]. COMMUNICATIONS OF THE ACM, 2004, 47 (06) : 53 - 57
  • [18] Identifying, understanding, and analyzing critical infrastructure interdependencies
    Rinaldi, Steven M.
    Peerenboom, James P.
    Kelly, Terrence K.
    [J]. IEEE Control Systems Magazine, 2001, 21 (06): : 11 - 25
  • [19] Welander P, 2009, SECURING LEGACY CONT
  • [20] Yuxi G, 2005, IP BEARER NETWORK NG