IEEE Invited Paper - An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review
{"title":"IEEE Invited Paper - An Overview of Cyber Security Considerations and Vulnerabilities in Critical Infrastructure Systems and Potential Automated Mitigation - A Review","authors":"R. Mazzolin, Asad Madni","doi":"10.55708/js0104002","DOIUrl":null,"url":null,"abstract":": Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need to be considered in the future. This invited paper discusses public policy issues related to the threat environment and provides a comprehensive description of the various cyber vulnerabilities and risks arising from a broad range of technologies supporting critical infrastructure and highlights key requirements and design principles desired from next generation automated defence capabilities. This document provides a unique review of key aspects related to these separate but interrelated subject areas that will hopefully provide greater context, background and clarity for senior decision makers responsible for shaping development agendas for their organizations.","PeriodicalId":156864,"journal":{"name":"Journal of Engineering Research and Sciences","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Engineering Research and Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.55708/js0104002","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
: Executive leadership in government, military and industry are faced with many difficult challenges when trying to understand the complex interaction of public and government security policies, the vulnerabilities in the wide array of key technologies supporting critical infrastructure upon which society is vitally dependent, and the identification of key cyber security trends that will need to be considered in the future. This invited paper discusses public policy issues related to the threat environment and provides a comprehensive description of the various cyber vulnerabilities and risks arising from a broad range of technologies supporting critical infrastructure and highlights key requirements and design principles desired from next generation automated defence capabilities. This document provides a unique review of key aspects related to these separate but interrelated subject areas that will hopefully provide greater context, background and clarity for senior decision makers responsible for shaping development agendas for their organizations.