Adoption of ISMS for Protecting SCADA Systems against Cyber Terrorism Threats
نویسندگان
چکیده
The potential for catastrophic cyber attacks that can cripple the operations of critical infrastructures of nations is worrying. The consequences of cyber attack to the Supervisory Control and Data Acquisition (SCADA) systems are wide, resulting in potentially catastrophic damages and disruption. This paper proposes for the Critical National Information Infrastructure (CNII) organizations to comply with the ISO/IEC 27001:2013 or Information Security Management System (ISMS), which provides a systematic guidance for the organization's information security risks management and the implementation of security controls to reduce such risks to an acceptable level. The implementation of the ISMS certification in Malaysia’s CNII will be the case study of this paper. Future works in this area can be further conducted, which may lead to the development of critical infrastructure protection (CIP) programs and the development of risk management frameworks to counter threats from cyber terrorism attacks for CNII. KeywordsCritical National Information Infrastructure (CNII); Cyber Terrorism; Cyberspace; SCADA
منابع مشابه
Safeguarding Australia from Cyber-terrorism:A Proposed Cyber-terrorism SCADA Risk Framework for Industry Adoption
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional physical attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This paper identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establish...
متن کاملIntroducing Resilience for SCADA Networks
The sovereignty of nations is highly dependent on the continuous and uninterrupted operation of critical infrastructures. Recent security incidents on SCADA networks show that threats in these environments are increasing in sophistication and number. To protect critical infrastructures against cyber attacks and to cope with their complexity, we advocate the application of a resilience strategy....
متن کاملSafeguarding Australia from Cyber-Terrorism: A SCADA Risk Framework
Terrorist groups are currently using information and communication technologies (ICTs) to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of capability within the cyber-arena to coordinate cyber-based attacks. This chapter identifies that cyber-terrorism capabilities are an integral, imperative, yet under-researched component in establishing, an...
متن کاملCyber Threats Foresight Against Iran Based on Attack Vector
Cyber threats have been extraordinary increased in recent years. Cyber attackers, including government agencies or hackers, have made significant advances in the use of various tools for attacking target systems in some countries particularly on Islamic republic of Iran. The complexity of cyber threats and the devastating effects of them on critical systems highlights necessity of cyber thr...
متن کاملUnderstanding Optimal Investment in Cyber Terrorism: A Decision Theoretic Approach
In this work, the author develops and explains a set of economic models under the decision theoretic framework to conceptualize the requisite levels of investment in the defense against cyber terrorism. This paper begins with a naïve model of cyber defense, on which the author progressively implements aspects of layered defense and domain conditionality to investigate practicable investment lev...
متن کامل