메뉴 건너뛰기




Volumn 27, Issue 2, 2014, Pages 52-60

Cyber security and critical energy infrastructure

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; CRITICAL INFRASTRUCTURES; CYBER ATTACKS; PUBLIC WORKS;

EID: 84897063618     PISSN: 10406190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tej.2014.01.011     Document Type: Article
Times cited : (65)

References (44)
  • 1
    • 85168252888 scopus 로고    scopus 로고
    • U.S. Says China's Government, Military Used Cyberespionage
    • May 7, 2013 ed.
    • Barnes J.E. U.S. Says China's Government, Military Used Cyberespionage. Wall Street Journal 2013, May 7, 2013 ed.
    • (2013) Wall Street Journal
    • Barnes, J.E.1
  • 5
    • 80955142795 scopus 로고    scopus 로고
    • The cyber threat landscape: challenges and future research directions
    • Choo K.-K.R. The cyber threat landscape: challenges and future research directions. Computers & Security 2011, 30(8).
    • (2011) Computers & Security , vol.30 , Issue.8
    • Choo, K.-K.R.1
  • 6
    • 85168250317 scopus 로고    scopus 로고
    • Addressing cyber threats to oil and gas suppliers
    • Clayton B., Segal A. Addressing cyber threats to oil and gas suppliers. Energy Brief June 2013.
    • (2013) Energy Brief
    • Clayton, B.1    Segal, A.2
  • 7
    • 38049034816 scopus 로고    scopus 로고
    • DHS Homeland Security
    • DHS Critical Infrastructure 2013, Homeland Security. http://www.dhs.gov/critical-infrastructure.
    • (2013) Critical Infrastructure
  • 8
    • 85168239958 scopus 로고    scopus 로고
    • DHS, n.d. US Department of Homeland Security. Safeguarding and Security Cyberspace.
    • DHS, n.d. US Department of Homeland Security. Safeguarding and Security Cyberspace. http://www.dhs.gov/xlibrary/assets/pso-safeguarding-and-securing-cyberspace.pdf.
  • 9
    • 79955136633 scopus 로고    scopus 로고
    • EC European Commission 2 7
    • EC Digital Agenda for Europe 2013, European Commission 2 7. https://ec.europa.eu/digital-agenda/en/news/policy-critical-information-infrastructure-protection-ciip.
    • (2013) Digital Agenda for Europe
  • 10
    • 84861935439 scopus 로고    scopus 로고
    • EIA U.S. Energy Information Administration
    • EIA Annual Energy Outlook 2012 2012, U.S. Energy Information Administration.
    • (2012) Annual Energy Outlook 2012
  • 11
    • 84886215768 scopus 로고    scopus 로고
    • EU EUROPA Summaries of EU legislation 8 17
    • EU Critical infrastructure protection 2010, EUROPA Summaries of EU legislation 8 17. http://europa.eu/legislation_summaries/justice_freedom_security/fight_against_terrorism/l33259_en.htm.
    • (2010) Critical infrastructure protection
  • 12
    • 67651048924 scopus 로고    scopus 로고
    • The lucrative world of cyber-espionage
    • Everett C. The lucrative world of cyber-espionage. Computer Fraud & Security 2009, 7.
    • (2009) Computer Fraud & Security , vol.7
    • Everett, C.1
  • 13
    • 85168236780 scopus 로고    scopus 로고
    • Stuxnet admission likely to have foreign policy consequences
    • Farivar, C. Stuxnet admission likely to have foreign policy consequences. Arstechnica 2012, June.
    • (2012) Arstechnica
    • Farivar, C.1
  • 15
    • 77955582072 scopus 로고    scopus 로고
    • The challenge of cyber attack deterrence
    • Geers K. The challenge of cyber attack deterrence. Computer Law & Security Review 2010, 26(3).
    • (2010) Computer Law & Security Review , vol.26 , Issue.3
    • Geers, K.1
  • 18
    • 38349104843 scopus 로고    scopus 로고
    • Industrial espionage in a hi-tech world
    • Jones A. Industrial espionage in a hi-tech world. Computer Fraud & Security 2008, 1.
    • (2008) Computer Fraud & Security , vol.1
    • Jones, A.1
  • 20
    • 85168253060 scopus 로고    scopus 로고
    • Virus Aimed at Iran Infected Chevron Network
    • King R. Virus Aimed at Iran Infected Chevron Network. Wall Street Journal 2012.
    • (2012) Wall Street Journal
    • King, R.1
  • 21
    • 78449305755 scopus 로고    scopus 로고
    • Cyber security for home users: a new way of protection through awareness enforcement
    • Kritzinger E., von Solms S.H. Cyber security for home users: a new way of protection through awareness enforcement. Computer & Security 2010, 29.
    • (2010) Computer & Security , vol.29
    • Kritzinger, E.1    von Solms, S.H.2
  • 23
    • 79952071955 scopus 로고    scopus 로고
    • An estimate of the value of lost load for Ireland
    • Leahy E., Richard S.J.T. An estimate of the value of lost load for Ireland. Energy Policy 2011, 39.
    • (2011) Energy Policy , vol.39
    • Leahy, E.1    Richard, S.J.T.2
  • 26
    • 85168234768 scopus 로고    scopus 로고
    • Mills E. CNET. 8 27 2012, http://news.cnet.com/8301-1009_3-57501066-83/saudi-oil-firm-says-30000-computers-hit-by-virus/.
    • (2012) CNET. 8 27
    • Mills, E.1
  • 28
    • 33846785112 scopus 로고    scopus 로고
    • The value of supply security - the cost of power interruption: economic input for damage reduction and investment networks
    • de Nooij M., Koopmans C., Bijvoet C. The value of supply security - the cost of power interruption: economic input for damage reduction and investment networks. Energy Economics 2007, 29.
    • (2007) Energy Economics , vol.29
    • de Nooij, M.1    Koopmans, C.2    Bijvoet, C.3
  • 29
    • 84897049836 scopus 로고    scopus 로고
    • NW3C Federal Bureau of Investigation and National White Collar Crime Center
    • NW3C Internet Crime Report 2012 2012, Federal Bureau of Investigation and National White Collar Crime Center.
    • (2012) Internet Crime Report 2012
  • 30
    • 79960745153 scopus 로고    scopus 로고
    • Smart Grid cyber security for Europe
    • Pearson I.L.G. Smart Grid cyber security for Europe. Energy Policy 2011, 5211-5218.
    • (2011) Energy Policy , pp. 5211-5218
    • Pearson, I.L.G.1
  • 31
    • 84887074351 scopus 로고    scopus 로고
    • In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back
    • Perlroth N. In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back. New York Title 2012, 10(23).
    • (2012) New York Title , vol.10 , Issue.23
    • Perlroth, N.1
  • 32
    • 34249339041 scopus 로고    scopus 로고
    • Information age espionage, debriefing a real-world, top-class cyber sleuth
    • Power R., Forte D. Information age espionage, debriefing a real-world, top-class cyber sleuth. Computer Fraud & Security 2007, (5).
    • (2007) Computer Fraud & Security , Issue.5
    • Power, R.1    Forte, D.2
  • 33
    • 85168245821 scopus 로고    scopus 로고
    • Reuters. Reuters. January 21, 2013.
    • Reuters. Reuters. January 21, 2013. http://www.reuters.com/article/2013/01/21/us-sahara-crisis-idUSBRE90F1JJ20130121.
  • 36
    • 85168241456 scopus 로고    scopus 로고
    • Limiting free speech on the internet: cyber attack against internal dissidents in Iran and Russia
    • Elsevier, (Chapter 5)
    • Shakarian P., Shakarian J., Ruef A. Limiting free speech on the internet: cyber attack against internal dissidents in Iran and Russia. Introduction to Cyber-warfare 2013, Elsevier, (Chapter 5).
    • (2013) Introduction to Cyber-warfare
    • Shakarian, P.1    Shakarian, J.2    Ruef, A.3
  • 37
    • 84877775094 scopus 로고    scopus 로고
    • Cyber terrorism challenges: the need for a global response to a multi-jurisdictional crime
    • Tehrani P.M., Manap N.A., Taji H. Cyber terrorism challenges: the need for a global response to a multi-jurisdictional crime. Computer Law & Security Review 2013, 29.
    • (2013) Computer Law & Security Review , vol.29
    • Tehrani, P.M.1    Manap, N.A.2    Taji, H.3
  • 38
    • 85168243816 scopus 로고    scopus 로고
    • Who needs cyber-spying
    • The Economist Feb. 23, 2013 ed.
    • The Economist Who needs cyber-spying. The Economist 2013, Feb. 23, 2013 ed.
    • (2013) The Economist
  • 39
    • 85168237536 scopus 로고    scopus 로고
    • U.S.DOE
    • U.S.DOE Energy.gov. 6 27 2013, http://energy.gov/articles/energy-department-launches-public-private-initiative-help-oil-and-natural-gas-industry.
    • (2013) Energy.gov. 6 27
  • 41
    • 84897043940 scopus 로고    scopus 로고
    • Energy infrastructure targeted as cyber attacks increase globally
    • Umbach F. Energy infrastructure targeted as cyber attacks increase globally. World Review 2013, 5(3). http://www.worldreview.info/content/energy-infrastructure-targeted-cyber-attacks-increase-globally.
    • (2013) World Review , vol.5 , Issue.3
    • Umbach, F.1
  • 42
    • 75349099263 scopus 로고    scopus 로고
    • Transnational infrastructure vulnerability: the historical shaping of the 2006 European "Blackout"
    • van der Vleuten E., Lagendijk V. Transnational infrastructure vulnerability: the historical shaping of the 2006 European "Blackout". Energy Policy 2010, 38.
    • (2010) Energy Policy , vol.38
    • van der Vleuten, E.1    Lagendijk, V.2
  • 43
    • 85168235854 scopus 로고    scopus 로고
    • Soft bomb' knocks out power plants
    • May 3
    • Walker M. Soft bomb' knocks out power plants. The Guardian 1999, May 3.
    • (1999) The Guardian
    • Walker, M.1
  • 44
    • 84875747087 scopus 로고    scopus 로고
    • Cyber security in the Smart Grid: survey and challenges
    • Wang W., Lu Z. Cyber security in the Smart Grid: survey and challenges. Computer Networks 2013, 1344-1371.
    • (2013) Computer Networks , pp. 1344-1371
    • Wang, W.1    Lu, Z.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.