Browse > Article
http://dx.doi.org/10.17703/JCCT.2021.7.1.674

A Study on the Application of Cybersecurity by Design of Critical Infrastructure  

YOO, Jiyeon (Dept. of Human-Centered Artificial Intelligence, Sangmyung Univ)
Publication Information
The Journal of the Convergence on Culture Technology / v.7, no.1, 2021 , pp. 674-681 More about this Journal
Abstract
Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.
Keywords
Cybersecurity by Design(CSbD); Critical Infrastructure Protection; Cyber Resilience;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Sunguk Lee, "Security and Privacy Protection of Vehicle-To-Grid Technology for Electric Vehicle in Smart Grid Environment." The Journal of the Convergence on Culture Technology (JCCT) Vol. 6, No. 1, pp.441-448, February 29, 2020. http://dx.doi.org/10.17703/2020.6.1.441   DOI
2 S. Massoud Amin, "Electricity infrastructure security: Toward reliable, resilient and secure cyber-physical power and energy systems." IEEE PESGen. Meeting, pp.15, Jul. 2010.
3 Yuan Yuan, Quanyan Zhy, Fuchun Sun, Qinyi Wang, and Tamer Basar, "Resilient Control of Cyber-Physical Systems against Denial-of-Service Attacks." 6th International Symposium on Resilient Control Systems (ISRCS 2013), San Francisco, CA, August 13-15, 2013.
4 D DiMase, ZA Collier, K Heffner, "Systems engineering framework for cyber physical security and resilience." I Linkov Environment Systems and Decisions 35 (2), pp. 291-300. 2015.   DOI
5 Fredrik Bjorck, Martin Henkel, Janis Stirna, Jelena Zdravkovic "Cyber Resilience - Fundamentals for a Definition." WorldCIST (1) 2015: 311-316
6 Hiep Tran, Enrique Campos-Nanez, Pavel Fomin, James S. Wasek "Cyber resilience recovery model to combat zero-day malware attacks." Comput. Secur. 61: pp.19-31, 2016.   DOI
7 Igor Linkov, Alexander Kott: "Fundamental Concepts of Cyber Resilience: Introduction and Overview." CoRR abs/1806.02852, 2018.
8 Babiceanu, R. F., & Seker, R. "Cyber-physical resource scheduling in the context of Industrial internet of things operations." Service orientation in holonic and multi-agent manufacturing (pp. 399-411). Heidelberg: Springer. 2019.
9 H. Boyes "Cybersecurity and Cyber-Resilient Supply Chains." Technology Innovation Management Review. 2015.
10 Urciuoli, L. "Cyber-resilience: A strategic approach for supply chain management." Technology Innovation Management Review, 5(4), 2015.
11 Andrew Chaves, Mason Rice, Stephen Dunlap, John M. Pecarina: "Improving the cyber resilience of industrial control systems." Int. J. Crit. Infrastructure Prot. 17: pp.30-48. 2017.   DOI