Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats DOI Creative Commons
Dojin Yoo,

Seunghuk Lee,

Sherry X. Yang

et al.

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10342 - 10342

Published: Nov. 11, 2024

This study examines the cybersecurity vulnerabilities of energy IT infrastructure in context rapid digital transformation and network expansion. While these advancements have improved efficiency, they also increased susceptibility to cyber threats, particularly from malware such as Industroyer, Triton, NotPetya, BlackEnergy3. By analyzing this research identifies key weaknesses systems highlights need for enhanced anomaly detection, segmentation, system integrity checks. To address vulnerabilities, proposes a layered security architecture which each layer—physical, control, network, application, security—provides independent protection while integrating into unified defense strategy. emphasizes necessity combining technical-, organizational-, policy-based responses bolster across all levels infrastructure. Key recommendations include immediate vulnerability patching, international cooperation, stronger legal frameworks, education, establishment command structure. provides practical insights strategies strengthening through comprehensive, integrated approach.

Language: Английский

Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions DOI Creative Commons
Tamara Zhukabayeva, Lazzat Zholshiyeva, Nurdaulet Karabayev

et al.

Sensors, Journal Year: 2025, Volume and Issue: 25(1), P. 213 - 213

Published: Jan. 2, 2025

This paper provides the complete details of current challenges and solutions in cybersecurity cyber-physical systems (CPS) within context IIoT its integration with edge computing (IIoT–edge computing). We systematically collected analyzed relevant literature from past five years, applying a rigorous methodology to identify key sources. Our study highlights prevalent layer attacks, common intrusion methods, critical threats facing IIoT–edge environments. Additionally, we examine various types cyberattacks targeting CPS, outlining their significant impact on industrial operations. A detailed taxonomy primary security mechanisms for CPS is developed, followed by comparative analysis our approach against existing research. The findings underscore widespread vulnerabilities across architecture, particularly relation DoS, ransomware, malware, MITM attacks. review emphasizes advanced technologies, including machine learning (ML), federated (FL), blockchain, blockchain–ML, deep (DL), encryption, cryptography, IT/OT convergence, digital twins, as essential enhancing real-time data protection computing. Finally, outlines potential future research directions aimed at advancing this rapidly evolving domain.

Language: Английский

Citations

2

Enhancing Cybersecurity in Energy IT Infrastructure Through a Layered Defense Approach to Major Malware Threats DOI Creative Commons
Dojin Yoo,

Seunghuk Lee,

Sherry X. Yang

et al.

Applied Sciences, Journal Year: 2024, Volume and Issue: 14(22), P. 10342 - 10342

Published: Nov. 11, 2024

This study examines the cybersecurity vulnerabilities of energy IT infrastructure in context rapid digital transformation and network expansion. While these advancements have improved efficiency, they also increased susceptibility to cyber threats, particularly from malware such as Industroyer, Triton, NotPetya, BlackEnergy3. By analyzing this research identifies key weaknesses systems highlights need for enhanced anomaly detection, segmentation, system integrity checks. To address vulnerabilities, proposes a layered security architecture which each layer—physical, control, network, application, security—provides independent protection while integrating into unified defense strategy. emphasizes necessity combining technical-, organizational-, policy-based responses bolster across all levels infrastructure. Key recommendations include immediate vulnerability patching, international cooperation, stronger legal frameworks, education, establishment command structure. provides practical insights strategies strengthening through comprehensive, integrated approach.

Language: Английский

Citations

1