PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Cyber threats to ot systems in the energy industry

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
In today's economy, we can see a modern direction of action including the concept of technological and organizational transformation of enterprises, known as Industry 4.0. Significant changes are also taking place in the energy industry, where modifications in the use of infrastructure, systems of operational technology (OT) are noticeable. The aim of the article is to present the threats in the field of cyberattacks that can be carried out on this infrastructure within the mentioned sector.
Czasopismo
Rocznik
Tom
Opis fizyczny
Bibliogr. 24 poz., rys.
Bibliografia
  • Ambroise J. E., IT/OT Convergence: Benefits, Challenges, and Examples. https://www.emnify.com/iot-glossary/itot-convergence#chapter-2-1, (access: 30.01.2023).
  • BBC News, Ukraine power cut 'was cyber-attack'. https://www.bbc.com/news/technology-38573074, (access: 03.02.2023).
  • Bezpieczny Internet, Co to jest DDoS? Na czym polega atak DDoS? https://bezpiecznyinternet.edu.pl/co-to-jestddos/, (access: 04.02.2023).
  • Bieńkowski M., Cyberbezpieczeństwo w przemyśle, https://automatykaonline.pl/Artykuly/Bezpieczenstwo/Cyberbezpieczenstwo-w-przemysle, (access: 04.02.2023).
  • Delas C., What is an Energy Management System (EMS)? https://www.metron.energy/blog/ems-energymanagement-system-definition/, (access: 31.01.2023).
  • Energy Knowledge Base, Transmission management system (TMS). https://www.energyknowledgebase.com/topics/transmission-management-system-tms.asp (access: 31.01.2023).
  • Gillis Alexander S. , Distributed control system (DCS). https://www.techtarget.com/whatis/definition/distributedcontrol-system, (access: 31.01.2023).
  • Immerman G., Industry 4.0 Advantages and Disadvantages. https://www.machinemetrics.com/blog/industry-4-0-advantages-and-disadvantages, (access: 27.01.2023).
  • Kiprin B., What is “denial of service”? https://crashtest-security.com/denial-of-service-attack/, (access: 03.02.2023).
  • Meehan A., Lithuanian Energy Firm Disrupted by DDOS Attack. https://www.infosecuritymagazine.com/news/lithuanian-energy-ddos-attack/, (access: 04.02.2023).
  • Newman L. H., Hackers Could Use IoT Botnets to Manipulate Energy Markets. https://www.wired.com/story/hackers-iot-botnets-manipulate-energy-markets/, (access: 04.02.2023)
  • Nomios, Top five OT security threats. https://www.nomios.com/news-blog/top-five-ot-security-threats/, (access: 03.02.2023).
  • Owasp, Setting Manipulation. https://owasp.org/www-community/attacks/Setting_Manipulation (access: 03.02.2023).
  • Rawat S., 5 Uses of IoT In Energy Sector. https://www.analyticssteps.com/blogs/5-uses-iot-energy-sector, (access: 31.01.2023).
  • RC Advisory Group, SCADA Systems for Electric Power Industry. https://www.arcweb.com/market-studies/scadasystems-electric-power-industry (access: 31.01.2023).
  • SailPoint, How Compromised Credentials Lead to Data Breaches. https://www.sailpoint.com/identity-library/howcompromised-credentials-lead-to-data-breaches/, (access: 03.02.2023).
  • Schälling U., Bridging the gap between IT and OT systems. https://www.power-grid.com/td/bridging-the-gapbetween-it-and-ot-systems/#gref, (access: 30.01.2023).
  • Słownik języka polskiego PWN, entry: przemysł (industry). https://sjp.pwn.pl/slowniki/przemys%C5%82.html (access: 20.01.2023).
  • Stepień M., Segmentacja sieci w ochronie przemysłowych systemów sterowania. https://seqred.pl/segmentacjasieci-ot/, (access: 04.02.2023).
  • Stępień M., Bezpieczeństwo: działy OT i IT – razem, czy oddzielnie? https://seqred.pl/bezpieczenstwo-ot-it-razemczy-oddzielnie/, (access: 30.01.2023).
  • Taylor Ch., Industry 4.0 – the pros and cons of the new industrial revolution. https://www.advancedengineeringuk.com/2022/01/21/industry-4-pros-cons/, (access: 27.01.2023).
  • The SecMaster, What Is Authentication Bypass Vulnerability? How To Prevent It? https://thesecmaster.com/whatis-authentication-bypass-vulnerability-how-to-prevent-it/ (access: 03.02.2023).
  • Trendmicro, What is an IoT botnet? https://www.trendmicro.com/vinfo/us/security/definition/iot-botnet, (access: 04.02.2023).
  • UNext, Data Manipulation: Definition, Purpose, Examples. https://www.jigsawacademy.com/blogs/datascience/data-manipulation/, (access: 03.02.2023).
Uwagi
Opracowanie rekordu ze środków MEiN, umowa nr SONP/SP/546092/2022 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2024).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-db8fca80-c787-4b67-a99c-fce62c081d83
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.