Network infrastructure diagram.

Network infrastructure diagram.

Source publication
Article
Full-text available
Rapid progress of computing and info-communication technologies (ICT) has changed the ecosystem of power production and delivery. Today, an energy network is a complex set of interrelated devices and information systems covering all areas of electric power operations and applying ICT based on open standards, such as IEC 60870, IEC 61850, and IEC 61...

Context in source publication

Context 1
... potential attacks development graph can be represented by several methods. Figure 5 shows a network diagram. Let us consider several common types of the attack graphs on this sample [32]: ...

Similar publications

Article
Full-text available
Background and objectives: Computer systems and network infrastructures are still exposed to many security risks and cyber-attack vulnerabilities despite advancements of information security. Traditional signature-based intrusion detection systems and security solutions by matching rule-based mechanism and prior knowledge are insufficient of fully...

Citations

... The attacks result in power outages and disruptions, impacting the availability and affordability of energy [72]. Recent high-profile cyberattacks on energy infrastructures, such as the security breach of the Colonial Pipeline and attacks on Ukraine's power grid, have highlighted the vulnerability of energy grids to cyber threats [73]. ...
Article
Full-text available
In an era where society becomes increasingly reliant on digital technology and interconnected systems, the significance of cybersecurity for upholding sustainable development has become paramount. The Sustainable Development Goals (SDGs) were adopted by the United Nations in 2015 as a universal call to action to end poverty, protect the planet, and ensure that by 2030, people enjoy peace and prosperity. As we draw closer to the critical year of 2030, the insights of this paper gain urgency in light of ongoing efforts to achieve the SDGs. This review paper takes an innovative stance by examining how cybersecurity challenges align with each SDG. The novelty of this study is that, it not only highlights the interconnected nature of cybersecurity within each goal but also identifies and categorizes the top five emerging threats that could impact the 17 goals. By pinpointing potential risks, it calls for further research and strategies to counter these cyber threats that might hinder the progress towards the SDGs. This research work serves as valuable guidance for researchers, policymakers, and practitioners, offering a comprehensive understanding of the intricate relationship between cybersecurity and sustainable development.