Layer | Fill | Outline |
---|
Map layers
Theme | Visible | Selectable | Appearance | Zoom Range (now: 0) |
---|
Fill | Stroke |
---|---|
Collaborating Authors
Results
- Information Technology > Security & Privacy (0.40)
- Government > Military > Cyberwarfare (0.40)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (0.40)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (0.40)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy > Oil & Gas > Upstream (0.82)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
Summary Intelligent automated industrial process control, enabled by IR 4.0 technology, requires increased system integration and connectedness. With such development comes a heightened risk of cyberattack for operational technology (OT) systems, including industrial control systems (ICS) and industrial automation and control systems (IACS), historically shielded from cyberspace. Cyberattacks on OT systems can also impact the physical world. The recent attack on the US Colonial Pipeline interrupted delivery of oil along the US West coast for several days, resulting in a declaration of a state of emergency, while the Ukraine power grid attacks interrupted electrical power supply in Kyiv, impacting thousands of consumers. In 2021, an Equinor-operated platform on the Norwegian Continental shelf was hit by malware. The incident had the potential to affect the drilling control system (DCS). For ICS, the concern is ensuring a safe process, as opposed to the more traditional concern with data protection for information technology (IT) system management. To ensure safe implementation of advanced industrial systems control, while avoiding unnecessary operational downtime, there is a need for cybersecurity solutions that account for risk for the whole cyberphysical system (CPS), including the ICS, the work environment, the product, and the physical surroundings. Diagnostic models and methods must therefore be developed that cover the functionality of the whole CPS. Further, to account for process dynamics and evolving cyberattack threats, adaptability is required with respect to both process state and new types of attacks. For this purpose, knowledge-based awareness monitoring combined with existing cyberattack detection tools for ICS, known as ICS intrusion detection systems (IDS), is proposed, providing an element of artificial intelligence. Results from studies in a DCS environment indicate that existing monitoring applications can be used to detect and discern between different types of cyberattacks on CPSs. This indicates feasibility with respect to monitoring the control and IT components of the ICS system for building risk-based cybersecurity decision support solutions. The key challenge and novelty of the proposed approach is to extend the capability of cybermonitoring in systems control to automated evaluation of process risk, including risk to the physical environment. Such capability will enable appropriate decision support with respect to both process risk and operational downtime.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy > Oil & Gas > Upstream (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Networks (1.00)
With a rapid transition toward renewable energy, the energy sector has an increased reliance on technology. This makes it particularly vulnerable with regard to cybersecurity because it depend on interconnected systems and digital technologies that make interactions a breeding ground for threats such as ransomware and phishing attacks. Understanding Key Vulnerabilities Although the energy industry, encompassing the electric-power and gas sectors, faces cybersecurity threats like those encountered by other industries, it also has specific vulnerabilities that require specific attention. A cyberattack against an energy provider can lead to widespread power outages, significant economic losses, and damage to physical infrastructure and compromise the safety of workers and the public. The widespread effect of a security breach is astronomical.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
Abstract Intelligent automated industrial process control requires a higher level of systems integration and connectedness than what has traditionally been the case. With such development comes increased risk of cyber-attack for Operational Technology (OT) systems such as Industrial Control Systems (ICS). For ICS, cyber-attacks can have significant consequences also in the physical world, with potentially catastrophic consequences, as experienced in the Colonial Pipeline and the Ukraine Power Grid attacks. Physical risk to the work environment, the product, and surroundings should therefore be accounted for in cybersecurity solutions for ICS. For this purpose, models and methods are required that consider the function of the whole Cyber-Physical System (CPS) not just the ICS, with the capability of detecting and correlating observations across the layers of system control, including the physical process being controlled. To achieve this, a context-based detection approach that can model the CPS and combine this with a process-aware risk analysis for attack response is proposed. The approach also needs to be adaptable (intelligent) to account for the process dynamics and the evolving cyber-attack threats. For this purpose, diagnostic models adapted to the industrial process should be applied together with situational awareness monitoring and cyber-attack detection tools, such as ICS Intrusion Detection Systems (IDS). The capability of the ICS IDS therefore needs to be extended to cover both Information Technology (IT) and OT parts of the ICS and include an understanding of the physical system and process as a knowledge basis, fed by process sensor and instrumentation data. These diagnostic models must cover the whole CPS in the risk analysis to provide aid in the attack response decision making. To achieve this, the models need to combine the physical characteristics of the process with the characteristics of the other system layers. Based on studies in a drilling control system environment, results indicate that existing tools can be used to detect and discern between different types of cyber-attack on Cyber-Physical Systems (CPS). This indicates feasibility with respect to monitoring of the OT and IT part of the system for building risk-based cybersecurity solutions. The challenge and novel part are to extend IT and OT systems cyber detection with automated evaluation of the resulting process risk taking physical process information into account, to make response decisions not only based on potential digital consequences but also consequences for the process and physical world.
- Europe > Ukraine (0.35)
- North America > United States (0.28)
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Networks (1.00)
In this episode, Steve Darnell, the president and CEO of Katalyst Data Management, discusses how digital transformation improves business processes. He describes the importance of cybersecurity, how to start the digitalization process, and the common obstacles companies face when embracing digital transformation. He also comments on the common misperceptions and the hidden benefits of embracing digital advancements. This conversation connects to all parts of the oil and gas workflow and showcases the value proposition for companies. Hear the full episode at .
- Information Technology > Security & Privacy (0.54)
- Government > Military > Cyberwarfare (0.38)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (0.38)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (0.38)
Sustainability and cybersecurity are rarely mentioned in the same sentence. Sustainability is tangible: On a given day, you might see electric vehicles zooming down the street, wind farms dotting the countryside, and rain gardens collecting and conserving water. By contrast, nearly all cybersecurity solutions fall into the background of our daily lives. We turn the lights on, browse the internet, make phone calls, and use smart thermostats without seeing the vast infrastructure underpinning our technology. And yet, the infrastructure needed to enable our sustainable future requires far greater levels of cybersecurity than previously managed.
- Transportation > Ground > Road (1.00)
- Transportation > Electric Vehicle (1.00)
- Information Technology > Security & Privacy (1.00)
- (2 more...)
- Health, Safety, Environment & Sustainability > Sustainability/Social Responsibility > Sustainable development (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
Abstract The digitization of the oil and gas industry creates potentially detrimental opportunities for terrorists, criminals, insiders, and activists to exploit. Due to the COVID-19 pandemic, working remotely has become the norm, and remote collaboration has been enabled by such Internet-based applications as Microsoft Teams, Zoom, and others. Remote employees may be more casual with cybersecurity, which further increases the risk of cyberattacks. Successful cyberattacks against oil and gas assets or operations have the capacity to cripple economies, disrupt power grids, and initiate political or public unrest and chaos. Cybersecurity defense should be as central to our organizational culture as turning on our workplace computer. We discuss the most likely weak points in our systems and possible solutions.
- North America > United States (1.00)
- Europe (0.68)
- Information Technology > Security & Privacy (1.00)
- Government > Regional Government > North America Government > United States Government (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy > Oil & Gas (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
- Information Technology > Security & Privacy (1.00)
- Information Technology > Communications > Networks (1.00)
- Information Technology > Communications > Collaboration (1.00)
- Information Technology > Artificial Intelligence > Machine Learning > Neural Networks (0.94)
The Transportation Security Administration (TSA) is loosening pipeline cybersecurity rules imposed after the hack of Colonial Pipeline last year, giving companies a longer window to report cyberattacks and more leeway to design their defenses. The first-of-their-kind cyber directives, unveiled after a ransomware attack disrupted the East Coast's largest fuel conduit for 6 days in May 2021, drew pushback from businesses that argued the standards were overly prescriptive and in some cases risked disrupting the flow of oil and gas. Lobbyists say that updated versions of the two yearlong directives could hint at how the agency intends to write permanent cyber regulations for pipelines and other surface transportation. "We're encouraged by the changes they've made," said Suzanne Lemieux, director of operations security and emergency response policy at the American Petroleum Institute, an oil and gas trade group. "There were a lot of things that weren't well thought out in the urgency of getting this out [last year]."
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy > Oil & Gas (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)
New research published by DNV reveals that energy executives anticipate cyberattacks that compromise life, property, and the environment on the sector within the next 2 years. The Cyber Priority, a research report exploring the state of cybersecurity in the energy sector, finds that more than four-fifths of professionals working in the power, renewables, and oil and gas sectors believe a cyberattack on the industry is likely to cause operational shutdowns (85%) and damage to energy assets and critical infrastructure (84%). Three quarters (74%) expect an attack to harm the environment, while more than half (57%) anticipate it will cause loss of life. DNV's research is based on a survey of more than 940 energy professionals and in-depth interviews with industry executives. Rising fears over new and more extreme consequences of cyberattacks follow a series of high-profile security breaches in the energy industry in recent years.
- Information Technology > Security & Privacy (1.00)
- Government > Military > Cyberwarfare (1.00)
- Energy (1.00)
- Health, Safety, Environment & Sustainability > Security > Data and communications security (1.00)
- Data Science & Engineering Analytics > Information Management and Systems > Data security (1.00)