The United States of America faces an increasing number of threats to its critical infrastructure due to cyber-attacks. With the constant advancement of technology and the interconnectedness of various systems, the vulnerabilities in the nation’s infrastructure have become more pronounced. Cyber-attacks on critical infrastructure, such as power grids, transportation networks, and financial systems, pose a significant risk to national security and public safety. These attacks can disrupt essential services, cause economic losses, and potentially have severe consequences for the well-being of individuals and communities. The rise of cyber-terrorism is also a concern. Cyber-terrorists can exploit vulnerabilities in cyberspace to compromise infrastructure systems, causing chaos and panic among the population. The potential for destructive attacks on critical infrastructure is a pressing issue requiring constant attention and proactive measures.
References
[1]
Major, M., Romero-Mariona, J., Phipps, R., Tacliad, F., Slayback, S.M., Romero, E. and Hallman, R.A. (2020) Towards Quantifying Energy Resiliency through Return on Cyber Investment Modeling. 2020 HICSS Symposium on Cybersecurity Big Data Analytics, Hawaii, 7 January 2020.
[2]
Plėta, T., Tvaronavičienė, M., Casa, S.D. and Agafonov, K. (2020) Cyber-Attacks to Critical Energy Infrastructure and Management Issues: Overview of Selected Cases. Insights into Regional Development, 2, 703-715. https://doi.org/10.9770/IRD.2020.2.3(7)
[3]
Hemsley, K. and Fisher, R. (2018) History of Cyber Incidents and Threats Involving Concern for Decision-Makers. In: Gardoni, P., Ed., Routledge Handbook of Sustainable and Resilient Infrastructure, Routledge, London, 359-374.
[4]
Maglaras, L.A., Kim, K.H., Janicke, H., Ferran, M.A., Rallis, S., Frank, P., Cruz, T.J., et al. (2018) Cyber Security of Critical Infrastructures. ICT Express, 4, 42-45. https://doi.org/10.1016/j.icte.2018.02.001
[5]
Maglaras, L., Ferrag, M., Derhab, A., Mukherjee, M., Janicke, H. and Rallis, S. (2018) Threats, Countermeasures and Attribution of Cyber-Attacks on Critical Infrastructures. EAI Endorsed Transactions on Security and Safety, 18, e1. https://doi.org/10.4108/eai.15-10-2018.155856
[6]
Miller, T., Staves, A., Maesschalck, S., Sturdee, M. and Green, B. (2021) Looking Back to Look Forward: Lessons Learned from Cyber-Attacks on Industrial Control Systems. International Journal of Critical Infrastructure Protection, 35, Article ID: 100464. https://doi.org/10.1016/j.ijcip.2021.100464
[7]
Chadwick, D.W., Fan, W., Costantino, G., De Lemos, R., Di Cerbo, F., Herwono, I., Wang, X.S., et al. (2020) A Cloud-Edge-Based Data Security Architecture for Sharing and Analyzing Cyber Threat Information. Future Generation Computer Systems, 102, 710-722. https://doi.org/10.1016/j.future.2019.06.026
[8]
Lamba, A. (2018) Protecting “Cybersecurity & Resiliency” of Nation’s Critical Infrastructure—Energy, Oil & Gas. International Journal of Current Research, 10, 76865-76876. https://doi.org/10.2139/ssrn.3535434
[9]
Pandey, S., Singh, R.K., Gunasekaran, A. and Kaushik, A. (2020) Cyber Security Risks in Globalized Supply Chains: A Conceptual Framework. Journal of Global Operations and Strategic Sourcing, 13, 103-128. https://doi.org/10.1108/JGOSS-05-2019-0042
[10]
CIO (2011) Night Dragon Brings Security Vulnerabilities into the Boardroom. https://www2.cio.com.au/article/376330/night_dragon_brings_security_vulnerabilities_into_boardroom/
[11]
Al-Abassi, A., Karimipour, H., Dehghantanha, A. and Parizi, R.M. (2020) An Ensemble Deep Learning-Based Cyber-Attack Detection in the Industrial Control System. IEEE Access, 8, 83965-83973. https://doi.org/10.1109/ACCESS.2020.2992249
[12]
Harry, C. and Vivek, S. (2021) Strategic Cyber Effects in Complex Systems: I understand the US Air Transportation Sector. 2021 13th International Conference on Cyber Conflict (CyCon), Tallinn, 25-28 May 2021, 111-131. https://doi.org/10.23919/CyCon51939.2021.9468293
[13]
Bracho, A., Saygin, C., Wan, H., Lee, Y. and Zarreh, A. (2018) A Simulation-Based Platform for Assessing the Impact of Cyber Threats on Intelligent Manufacturing Systems. Procedia Manufacturing, 26, 1116-1127. https://doi.org/10.1016/j.promfg.2018.07.148
[14]
Nifakos, S., Chandramouli, K., Nikolaou, C.K., Papachristou, P., Koch, S., Panaousis, E. and Bonacina, S. (2021) Influence of Human Factors on Cyber Security within Healthcare Organizations: A Systematic Review. Sensors, 21, Article 5119. https://doi.org/10.3390/s21155119
[15]
Clark, R.M., Hakim, S. and Panguluri, S. (2018) Protecting Water and Wastewater Utilities from Cyber-Physical Threats. Water and Environment Journal, 32, 384-391. https://doi.org/10.1111/wej.12340
[16]
Koblentz, G.D. (2020) Emerging Technologies and the Future of CBRN Terrorism. The Washington Quarterly, 43, 177-196. https://doi.org/10.1080/0163660X.2020.1770969
[17]
Gupta, S., Starr, M.K., Farahani, R.Z. and Ghodsi, M.M. (2020) Prevention of Terrorism—An Assessment of Prior POM Work and Future Potentials. Production and Operations Management, 29, 1789-1815. https://doi.org/10.1111/poms.13192
[18]
Carroll, P. and Windle, J. (2018) Cyber as an Enabler of Terrorism Financing, Now and in the Future. Journal of Policing, Intelligence and Counter Terrorism, 13, 285-300. https://doi.org/10.1080/18335330.2018.1506149
[19]
Howcroft, J. (2018) The Future of Terrorism: The Practitioners’ View. Connections: The Quarterly Journal, 17, 77-81. https://doi.org/10.11610/Connections.17.2.06
[20]
Schuurman, B. (2019) Topics in Terrorism Research: Reviewing Trends and Gaps, 2007-2016. Critical Studies on Terrorism, 12, 463-480. https://doi.org/10.1080/17539153.2019.1579777
[21]
Horgan, J.G. (2017) Psychology of Terrorism: Introduction to the Special Issue. American Psychologist, 72, 199-204. https://doi.org/10.1037/amp0000148
[22]
Okoye, I.E. (2018) Trends in Terrorism Incidents in Nigeria and the United States: Analysis of Data from 1980-2013. International Journal of Criminal Justice Sciences, 13, 200-211.
[23]
Bø, S. and Wolff, K. (2019) A Terrible Future: Episodic Future Thinking and the Perceived Risk of Terrorism. Frontiers in Psychology, 10, Article 481506. https://doi.org/10.3389/fpsyg.2019.02333
[24]
Coccia, M. (2018) The Relation between Terrorism and High Population Growth. Journal of Economics and Political Economy, 5, 84-104. https://doi.org/10.15664/jtr.1469
[25]
Albahar, M. (2019) Cyber-Attacks and Terrorism: A Twenty-First-Century Conundrum. Science and Engineering Ethics, 25, 993-1006. https://doi.org/10.1007/s11948-016-9864-0
[26]
Tonn, G., Kesan, J.P., Zhang, L. and Czajkowski, J. (2019) Cyber Risk and Insurance for Transportation Infrastructure. Transport Policy, 79, 103-114. https://doi.org/10.1016/j.tranpol.2019.04.019
[27]
Kammouh, O. and Cimellaro, G.P. (2018) Cyber Threat on Critical Infrastructure: A Growing Concern for Decision-Makers. In: Gardoni, P., Ed., Routledge Handbook of Sustainable and Resilient Infrastructure, Routledge, London, 359-374. https://doi.org/10.4324/9781315142074-19
[28]
Alcaide, J.I. and Llave, R.G. (2020) Critical Infrastructures Cybersecurity and the Maritime Sector. Transportation Research Procedia, 45, 547-554. https://doi.org/10.1016/j.trpro.2020.03.058
[29]
Sontowski, S., Gupta, M., Chukkapalli, S.S.L., Abdelsalam, M., Mittal, S., Joshi, A. and Sandhu, R. (2020) Cyber-Attacks on Smart Farming Infrastructure. 2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC), Atlanta, 1-3 December 2020, 135-143. https://doi.org/10.1109/CIC50333.2020.00025
[30]
Stergiopoulos, G., Gritzalis, D.A. and Limnaios, E. (2020) Cyber-Attacks on the Oil & Gas Sector: A Survey on Incident Assessment and Attack Patterns. IEEE Access, 8, 128440-128475. https://doi.org/10.1109/ACCESS.2020.3007960