Search Topic – Cyber Security/Cyber-attacks on Infrastructure
Database – EBSCOhost, “Computer Source”
1st Search – “Cyber-attack,” 902 results
Results are somewhat useful, but they are a little too broad. More terms are needed.
2nd Search – “Infrastructure Security,” 970 results
Great results here. I was thinking “security” was too generalized but in general articles are about cyber-security, which is what I care about.
3rd Search – “Cyber Security,” 3,599 results
Way too many results. These results deal with far more than infrastructure vulnerabilities. There are some good results, but many are not relevant to my search topic.
4th Search – “Cyber Security AND Infrastructure,” 292 results
Results were not as useful as I would’ve thought. Some were news articles, which are great for context, but are not exactly what I was looking for.
5th Search – “Cyber-attack AND Infrastructure AND Cyber Security,” 42 results
Some great results here, but I don’t know if I would normally try to get this specific because there aren’t many results. I would only get this specific if I couldn’t find good results using fewer search terms.
Bibliography Thesis – The purpose here is to find information on the security vulnerabilities of critical infrastructure networks. This includes major resources such as electricity, internet service, etc.
Adepu, S., Kandasamy, N. K., Zhou, J., & Mathur, A. (2019). Attacks on smart grid: Power supply interruption and malicious power generation. International Journal of Information Security, 19(2), 189–211. https://doi.org/10.1007/s10207-019-00452-z
This article covers some of the recent cyber attacks on power infrastructure including the Ukraine blackout a few years ago. It is written by multiple authors each with their own respective qualifications including employment at the Singapore University of Technology and Design.
Stošović, M. A., Dimitrijević, M., & Litovski, V. (2014). Computer security vulnerability as concerns the electricity distribution grid. Applied Artificial Intelligence, 28(4), 323–336. https://doi.org/10.1080/08839514.2014.891831
The article covers the security vulnerabilities to cyber attacks on the electrical grid. It comes from the Applied Artificial Intelligence journal and is 14 pages long. The first listed author, Stosovic, works in the Electronic Engineering department of the University of Nis in Serbia. I believe this article will be useful in my research into the current risk level of a successful major cyber attack on our infrastructure.
Verton, D. (2002, January 7). Critical Infrastructure Systems Face threat of cyberattacks. Computerworld. Retrieved April 18, 2022, from https://www.computerworld.com/article/2586544/critical-infrastructure-systems-face-threat-of-cyberattacks.html
The article is a bit old but is still very relevant. It discusses past cyberattacks from as far back as the 1960s and makes a case for enhancing cybersecurity, especially in critical
Yaacoub, J.-P. A., Noura, H. N., Salman, O., & Chehab, A. (2021). Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. International Journal of Information Security, 21(1), 115–158. https://doi.org/10.1007/s10207-021-00545-8
The article covers the security vulnerabilities to cyber attacks on different robotically controlled systems, such as farm equipment. It comes from the International Journal of Information Security and is 44 pages long. One of the authors, Salman, works in the Electrical and Computer Engineering Department at the American University of Beirut in Lebanon. I believe this article will be useful in my research into the current risk level of a successful major cyber attack on our infrastructure.
Zadeh, A., Jeyaraj, A., & Biros, D. (2020). Characterizing cybersecurity threats to organizations in support of risk mitigation decisions. e-Service Journal, 12(2), 1–34. https://doi.org/10.2979/eservicej.12.2.01
This article covers cybersecurity and the different threats that modern organizations face. Different types of organizations have different priorities in cybersecurity. All information in this entry was taken from e-Service Journal which belongs to Indiana University Press.