Consequences of possible cyberattacks on objects of the critical infrastructure

Authors

  • Serhii Honchar State research institute for special telecommunication and information protection, Kyiv,, Ukraine
  • Hennadii Leonenko State research institute for special telecommunication and information protection, Kyiv,, Ukraine

DOI:

https://doi.org/10.20535/2411-1031.2016.4.1.96101

Keywords:

Cyberthreat, cyberattack, critical infrastructure, consequences, automatic control system, process industries.

Abstract

Vital government areas for critical infrastructures defined by availability of automatic control systems of process industries. They include supervisory control and data acquisition systems, distributed control system. In this basis research of negative consequences possible cyberattacks on objects of a critical infrastructure is executed. The basic categories of influence of destructive actions in the automated systems by technological processes on objects of a critical infrastructure are resulted. The concept of object of a critical infrastructure reveals. The interrelation between cyberattacks on object of a critical infrastructure and consequences in industrial sector is shown. Criteria on which the list of information-telecommunication systems of objects of a critical infrastructure of the state is formed are resulted. Actives of objects of a critical infrastructure and a damage which can be caused them are considered. The statistics of incidents on objects of a critical infrastructure on branches for previous year is resulted. The diagram is resulted, where it is shown, that the greatest quantity of incidents is necessary on manufacture and power branch. The concept of a direct and indirect damage to information system of objects of a critical infrastructure reveals.It is shown, that recently in the world cyberattacks are directed on computer networks of power sector, a diplomatic corps, power departments, a defensive complex, the state enterprises, media of the companies. It is shown, that the purpose such cyberattacks, first of all, drawing of a damage to a critical infrastructure of the state. Results of the carried out research can be used at an urgency estimation cyberthreats objects of a critical infrastructure.

Author Biographies

Serhii Honchar, State research institute for special telecommunication and information protection, Kyiv,

candidate of technical sciences,
deputy head of centre

Hennadii Leonenko, State research institute for special telecommunication and information protection, Kyiv,

candidate of technical sciences,
senior researcher, scientific secretary

References

Cabinet of Ministers of Ukraine. (2016, Aug. 23). Resolution number 563, Approval the order of formation of the list of information and telecommunication systems акщь from the objects of critical infrastructure of the government [Online]. Available: http://zakon.rada.gov.ua/laws/ show/563-2016-%D0%BF. Accessed on: Dec. 18, 2015.

S.F. Honchar, “Features of cybersecurity industrial control systems”, in Proc. International Scientific Conference Problems and prospects of power engineering, electrotechnology and automation in agriculture, Kyiv, Ukraine, 2013, pp. 36-37.

ICS-CERT Monitor 2015. [Online]. Available: http://ics-cert.us-cert.gov/monitors. Accessed on: Dec. 18, 2015.

V.V. Domarev, Safety of information technologies. Methodology of creation of systems of protection. Kyiv, Ukraine: ООО “TYD “DS”, 2002.

Council of the European Union. (2008, Dec. 08). Directive 2008/114/EC, On the identification and designation of European critical infrastructures and the assessment of the need to improve their protection. [Online]. Available: http://eur-lex.europa.eu/legal-content/EN/ALL/?uri= celex:32008L0114. Accessed on: Dec. 18, 2015.

Published

2016-06-30

How to Cite

Honchar, S., & Leonenko, H. (2016). Consequences of possible cyberattacks on objects of the critical infrastructure. Collection "Information Technology and Security", 4(1), 108–113. https://doi.org/10.20535/2411-1031.2016.4.1.96101

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION