R. Rob, Gareth McLorn, Tolga Tural, Ahmad Hassan, Abdullahi O Sheikh
{"title":"Addressing cyber security for the oil, gas and energy sector","authors":"R. Rob, Gareth McLorn, Tolga Tural, Ahmad Hassan, Abdullahi O Sheikh","doi":"10.1109/NAPS.2014.6965377","DOIUrl":null,"url":null,"abstract":"The rapid spread of cyber threats and attacks are forcing many organizations to rethink their cyber security policies and standards. The latest cyber-attacks are well structured, organized, vicious, destructive and exceptionally sophisticated. The new reality of relentless cyber-attacks is causing havoc at a high level within oil and energy companies. There is a great need for developing and establishing new processes and policies with which to train a new “tech savvy” generation of professionals; who can then create and implement solid, systematic and sound cyber security policies. Cyber defense standards cannot be achieved fast enough to deal with this evolving threat.","PeriodicalId":343189,"journal":{"name":"2016 Saudi Arabia Smart Grid (SASG)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 Saudi Arabia Smart Grid (SASG)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NAPS.2014.6965377","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
The rapid spread of cyber threats and attacks are forcing many organizations to rethink their cyber security policies and standards. The latest cyber-attacks are well structured, organized, vicious, destructive and exceptionally sophisticated. The new reality of relentless cyber-attacks is causing havoc at a high level within oil and energy companies. There is a great need for developing and establishing new processes and policies with which to train a new “tech savvy” generation of professionals; who can then create and implement solid, systematic and sound cyber security policies. Cyber defense standards cannot be achieved fast enough to deal with this evolving threat.