International cyber security challenges and scada systems
Authors: Tinatin Mshvidobadze
Affiliation: Gori State University
Keywords: cyber terrorism and crime, cyber-attack, cyberspace, international security
ABSTRACT. The development and application of the information and communications technology has created a new battleground. Cyber security will significantly affect international relations in the 21st century. This paper gives an overview of the concepts and principles of cyber threats that affect the safety and security in an international context. It is shown the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. The discussion begins with an examination of what constitutes critical national infrastructure and the roles of ICS and SCADA systems within it. The examination also touches on the political and social challenges in achieving greater cyber security, and then shifts to a description of how the US government divides efforts among its lead cyber security agencies and what responses to a cyber attack on ICS or SCADA might look like. The discussion finishes with recommendations for strengthened international consensus on norms for state behavior, formalized public-private relationships, and interagency efforts to realize a more secure and resilient national infrastructure.
Russo-Georgian War, Wikipedia, 2016 en.wikipedia.org/wiki/Russo-Georgian_War
An Unprecedented Look at Stuxnet, the World’s First Digital Weapon’, Wired, November 2014 www.wired.com/2014/11/countdown-to-zero-day-stuxnet
A Cyberattack Has Caused Confirmed Physical Damage for the Second Time Ever’, Wired, January 2015 www.wired.com/2015/01/german-steel-mill-hack-destruction
Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid’, Wired, March 2016. www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid
French Coldwell, Chief Evangelist, Metricstream, National Fintech Cybersecurity Summit 2016, Sydney
2016 Threats Predictions, McAfee Labs, 2016 www.mcafee.com/au/resources/reports/rp-threats-predictions-2016.pdf
N. Choucri and D. Goldsmith, “Lost in cyberspace: harnessing the Internet, international relations, and global security,” Bulletin of the Atomic Scientists, vol. 68, no. 2, 2012, pp. 70-77.
S. Tatalović, A. Grizold, and V. Cvrtila, Suvremene sigurnosne politike. Zagreb: Golden marketing-Tehnička knjiga, 2008
H. Lin, “A virtual necessity: some modest steps toward greater cybersecurity,” Bulletin of the Atomic Scientists, vol. 68, no. 5, 2012, pp. 75-87
L. J. Janczewski and A. M. Colarik, Cyber warfare and cyber terrorism. Hershey: Information Science Reference, 2008
Park S, Lee K. Advanced approach to information security management system model for industrial control system. ScientificWorldJournal 2014;2014:348305
Gold S. The SCADA challenge: securing critical infrastructure. Netw Secur 2009;2009(8):18–20
Cardenas A, Amin S, Lin Z, Huang Y, Huang C, Sastry S. Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM; 2011. p. 355–66
Ricker L. Model predictive control of a continuous, nonlinear, two-phase reactor. J Process Control 1993;3(2):109–23. RiskWorld.
. [accessed 16.10.15]
Parfomak, Paul. Pipeline Cybersecurity: Federal Policy. Congressional Research Service (CRS) R42660. Washington, DC: CRS, 16 August 2012.