CYBERSECURITY CHALLENGES AND SOLUTIONS FOR CRITICAL INFRASTRUCTURE PROTECTION
DOI:
https://doi.org/10.18372/2225-5036.30.18604Keywords:
critical infrastructure, cybersecurity, security systems, information technologiesAbstract
Critical infrastructure can be vulnerable to attack from natural disasters or malicious actors such as hackers or terrorists. If these threats are not addressed quickly, they can lead to significant disruption in service delivery or even complete shutdowns which could have devastating consequences for those relying on them for their day-to-day activities. Therefore, it is important that governments take steps towards protecting critical infrastructure from potential threats by implementing comprehensive security measures both online and offline. Based on a comprehensive analysis of current issues, a decision has been made to ensure the cyber protection of critical infrastructure objects infrastructure. An analysis of cyber threats was carried out in relation to the dynamics of historical retrospective in sectors of critical infrastructure objects. As more and more systems become connected to the internet and vulnerable to cyber-attacks, it is important for organizations to invest in robust cybersecurity defenses to protect their systems from malicious actors. By taking these measures, organizations can help protect their systems from cyber-attacks and ensure the safety of the public. Formulates a model of threats from spills of critical infrastructure objects to cyber-attacks with a breakdown of threats by type. A triad of main actions and approaches for protecting critical infrastructure has been seen. Existing problems in implementing countermeasures and major threats posed to cyberspace actors have been identified. Key factors have been identified to break the cycle of cyber-attacks on critical infrastructure. Based on a comprehensive analysis and formulated concepts, a comprehensive approach to the protection of critical infrastructure objects is proposed in accordance with the management of global trends in the development of threats, threat models, and vulnerabilities of the protection system, a triad of actions and approaches to breaking cycles of cyber-attacks on critical infrastructure.
References
Critical Infrastructure Cyber Security Solu-tions. Huntsman. (2021, May 6). Retrieved February 13, 2023, from https://www.huntsmansecurity.com/ in-dustries/ critical-infrastructure.
Cyber-attacks on Critical Infrastructure. AGCS Global. Retrieved February 2, 2023, from https://www. agcs.allianz.com/news-and-insights/expert-risk-articles /cyber-attacks-on-critical-infrastructure.html
Significant cyber incidents: Strategic technol-ogies program. CSIS. Retrieved February 2, 2023, from https: // www.csis.org / programs / strategic-technologies-program/significant-cyber-incidents.
Weinberg, A. (2022, October 2). Analysis of top 11 cyber-attacks on critical infrastructure. FirstPoint. Retrieved February 3, 2023, from https://www.firstpoint-mg.com / blog /analysis-of-top-11-cyber-attackson-critical-infrastructure/.
Khemani, R. (2021, April 7). Cyber Security for Critical Infrastructure: Challenges and Solutions. Security Boulevard. Retrieved February 3, 2023, from https: //securityboulevard.com/2021/04/cyber-security-for-critical-infrastructure-challenges-and-solutions/.
Protecting critical infrastructure. Cybersecu-rity and Infrastructure Security Agency CISA. Retrieved February 3, 2023, from https: // www.cisa.gov/protecting-critical-infrastructure.
Infrastructure security. Cybersecurity and In-frastructure Security Agency CISA. (n.d.). Retrieved February 3, 2023, from https: //www.cisa.gov/infrastructure-security.
Llc, L., & Pires, A. (2021, September 10). Cy-bersecurity threats to critical infrastructure. LIFARS, a Security Scorecard company. Retrieved February 4, 2023, from https: // www.lifars.com / 2021 / 09/cybersecurity-thre¬ats-to-critical-infrastructure.
Office, U. S. G. A. Cybersecurity high-risk se-ries: Challenges in protecting Cyber Critical Infrastruc-ture. Cybersecurity High-Risk Series: Challenges in Protecting Cyber Critical Infrastructure / U.S. GAO. Retrieved February 4, 2023, from https://www.gao.gov/ products /gao-23-106441.
Brash, R. (2022, December 1). How 20 years of cyber security incidents inform future strategy. Verve Industrial. Retrieved February 5, 2023, from https:// verveindustrial.com/resources/blog/how-20-years-of-cyber-security-incidents-inform-future-strategy/.
Cybersecurity strategies for adjusting to covid-19. Retrieved February 5, 2023, from https://www. wipro.com / blogs / amit-kothari/cybersecurity-strategi¬es-for-adjusting-to-covid-19/.
Eytan, D. O. (2021, April 14). Council post: Six key guidelines to protect critical infrastructure from cyber threats. Forbes. Retrieved February 6, 2023, from https://www.forbes.com/sites/forbestechcouncil/2021 /04/14/six-key-guidelines-to-protectcriticalinfrastructu¬re-fromcyber-threats/.
Transforming the future of cybersecurity with an AI-driven approach. Retrieved February 13, 2023, from https:// www.wipro.com / cybersecurity / eliminating- the-complexity-in-cybersecurity-with-artificial-intellige¬nce.
Dow Jones & Company. (2022, June 8). Re-shaping incentives to protect critical infrastructure from cyberattacks. The Wall Street Journal. Retrieved Febru-ary 7, 2023, from https://deloitte.wsj. com/articles/ reshaping-incentives-to-protect-critical-infrastructure-from-cy¬berattacks-01654630416.
Protecting critical infrastructure from cyberattacks – nationally and internationally. EU Policy Blog. (2022, September 12). Retrieved February 7, 2023, from https: // blogs.microsoft.com / eupolicy / 2022/07/28/ protecting-critical-infrastructure-from-cyberattacks/.
Tagabe, P. M. (2022, November 8). How to protect critical infrastructure from Cyber Threats. Infra-structure Magazine. Retrieved February 8, 2023, from https: // infrastructuremagazine.com.au / 2022 / 11 /04/ how-to-protect-critical-infrastructure-from-cyber-threats/.