Abstract
Human life and economic organization in urban areas must fundamentally rely on essential systems that provide water, health services, electricity, supply, mobility, and communication to the population. Any temporary or permanent disruption of these critical infrastructures has severe negative consequences that range from reduced economic productivity to the loss of human life.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Authorized readers can obtain the respective electronic supplementary material from the publisher’s website.
- 2.
The author thanks Thomas Süssli and Martin Ball for sharing these ideas and for some inspiring discussion.
- 3.
The author is grateful to Jonas I. Liechti for developing and sharing these points.
References
Albert, R., Jeong, H., Barabasi, A.L.: Error and attack tolerance of complex networks. Nature 406, 378–382 (2000)
Alcaraz, C., Zeadally, S.: Critical infrastructure protection: requirements and challenges for the 21st century. Int. J. Crit. Infrastruct. Prot. 8, 53–66 (2015)
Alderson, D., Brown, G., Carlyle, M., Cox, L.: Sometimes there is no ‘most-vital’ arc: assessing and improving the operational resilience of systems. Mil. Oper. Res. 18(1), 21–37 (2013)
Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Moore, T., Pym, D., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 55–66. Springer, Boston (2010)
Bauer, E., Adams, R., Eustace, D.: Beyond Redundancy: How Geographic Redundancy Can Improve Service Availability and Reliability of Computer-Based Systems. John Wiley & Sons, Hoboken (2011)
Benna, U., Benna, I. (eds.): Urbanization and Its Impact on Socio-Economic Growth in Developing Regions. IGI Global, Hershey (2018)
Brown, G., Cox, L.: How probabilistic risk assessment can mislead terrorism risk analysts. Risk Anal. 31, 196–204 (2011)
Brown, G., Cox, L.: Making terrorism risk analysis less harmful and more useful: another try. Risk Anal. 31(2), 193–195 (2011)
Büchel, B., Partl, T., Corman, F.: The disruption at Rastatt and its effects on the Swiss railway system. In: Proceedings of the 8th International Conference on Railway Operations Modelling and Analysis (ICROMA), Norrköping, pp. 201–218 (2019)
Council of the European Union: Directive 2008/114/EC on the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. Council of the European Union, Brussels (2008)
Cox, L.: Some limitations of “Risk = Threat x Vulnerability x Consequence” for risk analysis of terrorist attacks. Risk Anal. 28, 1749–1761 (2008)
Cox, L.: Improving risk-based decision making for terrorism applications. Risk Anal. 29, 336–341 (2009)
Department of Homeland Security: National infrastructure protection plan. Washington DC (2013)
Ekman, C., Jensen, S.: Prospects for large scale electricity storage in Denmark. Energy Convers. Manag. 51(6), 1140–1147 (2010)
Energy Intelligence Group: Market forces: Saudi recovery. Report. Energy Compass (2019). http://www.energyintel.com/pages/login.aspx?fid=art&DocId=1051919
Ericsson, G.: Cyber security and power system communication-essential parts of a smart grid infrastructure. IEEE Trans. Power Delivery 25(3), 1501–1507 (2010)
Frey, B., Luechinger, S.: Decentralization as a disincentive for terror. Eur. J. Polit. Econ. 20, 509–515 (2004)
Genge, B., Kiss, I., Piroska, H.: A system dynamics approach for assessing the impact of cyber attacks on critical infrastructures. Int. J. Crit. Infrastruct. Prot. 10, 3–17 (2015)
Gino, F., Pisano, G.: Toward a theory of behavioral operations. Manuf. Serv. Oper. Manag. 10(4), 676–691 (2008)
Golany, B., Kaplan, E., Marmur, A., Rothblum, U.: Nature plays with dice-Terrorists do not: allocating resources to counter strategic versus probabilistic risks. Eur. J. Oper. Res. 192, 198–208 (2009)
Gopalakrishnan, K., Peeta, S. (eds.): Sustainable and Resilient Critical Infrastructure Systems. Springer, Berlin (2010)
Gordon, L., Loeb, M.: The economics of information security investment. ACM Trans. Inf. Syst. Secur. 5, 438–457 (2002)
Guikema, S.D.: Natural disaster risk analysis for critical infrastructure systems: an approach based on statistical learning theory. Reliab. Eng. Syst. Saf. 94(4), 855–860 (2009)
Hall, J., et al. (eds.): The Future of National Infrastructure: A System-of-Systems Approach. Cambridge University Press, Cambridge (2016)
Hanseatic Transport Consultancy: Estimation of the economic damage of the Rastatt interruption from a rail logistics perspective. Hamburg (2018). http://www.hupac.ch/EN/Study-Rastatt-disruption-b26dcc00
Huq, N., Hilt, S., Hellberg, N.: US cities exposed: industries and ICS. A shodan-based security study of exposed systems and infrastructure in the US (2017)
Kinney, R., Crucitti, P., Albert, R., Latora, V.: Modeling cascading failures in the North American power grid. Eur. Phys. J. B 46(1), 101–107 (2005)
Knapp, E., Langill, J.: Industrial Network Security, 2nd edn. Elsevier, Amsterdam (2014)
Lopez, J., Setola, R., Wolthusen, S. (eds.): Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense. Springer, Berlin (2012)
Melkunaite, L., Giroux, J., Burgherr, P.: Research note on the energy infrastructure attack database (EIAD). Perspect. Terrorism 7(6), 113–125 (2013)
Mermoud, A., Keupp, M., Huguenin, K., Palmié, M., Percia David, D.: To share or not to share: a behavioral perspective on human participation in security information sharing. J. Cybersecurity 5(1), tyz006 (2019)
Mohammed, O., Youssef, T., Cintuglu, M., Elsayed, A.T.: Design and simulation issues for secure power networks as resilient smart grid infrastructure. Smart Energy Grid Engineering, pp. 245–342. Academic Press, Cambridge (2017)
Moore, T.: The economics of cybersecurity: principles and policy options. Int. J. Crit. Infrastruct. Prot. 3, 103–117 (2010)
Motter, A., Lai, Y.C.: Cascade-based attacks on complex networks. Phys. Rev. E Stat. Nonlinear Soft Matter Phys. 66(6), 065102 (2002)
Murray, A., Grubesic, T.: Critical Infrastructure: Reliability and Vulnerability. Springer Advances in Spatial Science, Berlin (2007)
National Infrastructure Advisory Council: A Framework for Establishing Critical Infrastructure Resilience Goals. Department of Homeland Security, Washington DC (2010)
National Research Council: Review of the Department of Homeland Security’s Approach to Risk Analysis. The National Academy of Sciences, Washington, DC (2010)
Olsson, S. (ed.): Crisis Management in the European Union. Springer, Berlin (2009)
Ouyang, M.: Review on modeling and simulation of interdependent critical infrastructure systems. Reliab. Eng. Syst. Saf. 121, 43–60 (2014)
Parnell, G., Smith, C., Moxley, F.: Intelligent adversary risk analysis: a bioterrorism risk management model. Risk Anal. 30(1), 32–48 (2009)
Patrao, I., Figueres, E., Garcera, G., González-Medina, R.: Microgrid architectures for low voltage distributed generation. Renew. Sust. Energ. Rev. 43, 415–424 (2015)
Petit, F., et al.: Resilience Measurement Index: An Indicator of Critical Infrastructure Resilience. Argonne National Lab. (ANL), Argonne (2013)
Rinaldi, S.: Modeling and simulating critical infrastructures and their interdependencies. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS’04) (2004)
Rogan, A., Bridge, M.: Russia-Backed Hackers Try to Hijack Britain’s Power Supply. The Times, London (2017)
Sanger, D., Perlroth, N.: U.S. Escalates Online Attacks on Russia’s Power Grid. The New York Times (2019)
Sarker, P., Lester, H.D.: Post-disaster recovery associations of power systems dependent critical infrastructures. Infrastructures 4(2), 30 (2019)
Singh, A., Gupta, M., Ojha, A.: Identifying critical infrastructure sectors and their dependencies: an Indian scenario. Int. J. Crit. Infrastruct. Prot. 7, 71–85 (2014)
Smith, R.: Russian Hackers Reach U.S. Utility Control Rooms, Homeland Security Officials Say. The Wall Street Journal (2018)
Smith, R., Barry, R.: America’s Electric Grid has a Vulnerable Back Door-and Russia Walked Through It. The Wall Street Journal (2019)
Symantec Corporation: Dragonfly: Western energy sector targeted by sophisticated attack group. Outlook Series (2017). https://www.symantec.com/blogs/threat-intelligence/dragonfly-energy-sector-cyber-attacks
Tichý, L.: Energy infrastructure as a target of terrorist attacks from the Islamic State in Iraq and Syria. Int. J. Crit. Infrastruct. Prot. 25, 1–13 (2019)
United Kingdom Home Office : Report of the Official Account of the Bombings in London on 7th July 2005. United Kingdom Home Office, London (2006)
United Nations: World Urbanization Prospects: The 2018 Revision. United Nations: Department of Economics and Social Affairs, Population Division (2018)
United States Department of Energy: Insurance as a risk management instrument for energy infrastructure security and resilience. U.S. Department of Energy, Washington DC (2013)
Xu, W., Tao, Y., Guan, X.: The landscape of industrial control systems (ICS) devices on the internet. International Conference on Cyber Situational Awareness, Data Analytics and Assessment, Glasgow (2018)
Yusta, J., Correa-Henao, G., Lacal Arantegui, R.: Methodologies and applications for critical infrastructure protection: state-of-the-art. Energy Policy 39, 6100–6119 (2011)
Zetter, K.: Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid. Wired (2016)
Zhang, X., Hsiao, H.C., Hasker, G., Chan, H., Perrig, A., Andersen, D.: SCION: Scalability, control, and isolation on next-generation networks. In: Proceedings – IEEE Symposium on Security and Privacy, pp. 212–227 (2011)
Zhu, B., Joseph, A., Sastry, S.: A taxonomy of cyber attacks on SCADA systems. In: Proceedings of the 2011 International Conference on Internet of Things and 4th International Conference on Cyber, Physical and Social Computing, pp. 380–388. IEEE Computer Society, Washington (2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Keupp, M.M. (2020). The Security of Critical Infrastructures: Introduction and Overview. In: Keupp, M. (eds) The Security of Critical Infrastructures. International Series in Operations Research & Management Science, vol 288. Springer, Cham. https://doi.org/10.1007/978-3-030-41826-7_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-41826-7_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-41825-0
Online ISBN: 978-3-030-41826-7
eBook Packages: Business and ManagementBusiness and Management (R0)