Reference Hub4
Cyber Attacks on Critical Infrastructure: Review and Challenges

Cyber Attacks on Critical Infrastructure: Review and Challenges

Ana Kovacevic, Dragana Nikolic
ISBN13: 9781466663244|ISBN10: 1466663243|EISBN13: 9781466663251
DOI: 10.4018/978-1-4666-6324-4.ch001
Cite Chapter Cite Chapter

MLA

Kovacevic, Ana, and Dragana Nikolic. "Cyber Attacks on Critical Infrastructure: Review and Challenges." Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, edited by Maria Manuela Cruz-Cunha and Irene Maria Portela, IGI Global, 2015, pp. 1-18. https://doi.org/10.4018/978-1-4666-6324-4.ch001

APA

Kovacevic, A. & Nikolic, D. (2015). Cyber Attacks on Critical Infrastructure: Review and Challenges. In M. Cruz-Cunha & I. Portela (Eds.), Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance (pp. 1-18). IGI Global. https://doi.org/10.4018/978-1-4666-6324-4.ch001

Chicago

Kovacevic, Ana, and Dragana Nikolic. "Cyber Attacks on Critical Infrastructure: Review and Challenges." In Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance, edited by Maria Manuela Cruz-Cunha and Irene Maria Portela, 1-18. Hershey, PA: IGI Global, 2015. https://doi.org/10.4018/978-1-4666-6324-4.ch001

Export Reference

Mendeley
Favorite

Abstract

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.