IDEAS home Printed from https://ideas.repec.org/a/ssi/jouesi/v4y2017i4p559-573.html
   My bibliography  Save this article

Cyber security management model for critical infrastructure

Author

Listed:
  • Tadas Limba

    (Mykolas Romeris University, Lithuania)

  • Tomas Plėta

    (NATO Energy security center of excellence, Lithuania)

  • Konstantin Agafonov

    (Mykolas Romeris University, Lithuania)

  • Martynas Damkus

    (Mykolas Romeris University, Lithuania)

Abstract

Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.

Suggested Citation

  • Tadas Limba & Tomas Plėta & Konstantin Agafonov & Martynas Damkus, 2017. "Cyber security management model for critical infrastructure," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 4(4), pages 559-573, June.
  • Handle: RePEc:ssi:jouesi:v:4:y:2017:i:4:p:559-573
    DOI: 10.9770/jesi.2017.4.4(12)
    as

    Download full text from publisher

    File URL: https://jssidoi.org/jesi/uploads/articles/16/Limba_Cyber_security_management_model_for_critical_infrastructure.pdf
    Download Restriction: no

    File URL: https://jssidoi.org/jesi/article/125
    Download Restriction: no

    File URL: https://libkey.io/10.9770/jesi.2017.4.4(12)?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Tomas PlÄ—ta & Manuela TvaronaviÄ ienÄ— & Manuela TvaronaviÄ ienÄ— & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Insights into Regional Development, VsI Entrepreneurship and Sustainability Center, vol. 2(2), pages 538-548, June.
    2. Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Entrepreneurship and Sustainability Issues, VsI Entrepreneurship and Sustainability Center, vol. 5(2), pages 368-402, December.
    3. Tomas Plėta & Manuela Tvaronavičienė & Silvia Della Casa, 2020. "Cyber effect and security management aspects in critical energy infrastructures," Post-Print hal-02919624, HAL.
    4. Tadas Limba & Konstantin Agafonov & Linas Paukštė & Martynas Damkus & Tomas Plėta, 2017. "Peculiarities of cyber security management in the process of internet voting implementation," Post-Print hal-01706905, HAL.

    More about this item

    Keywords

    cyber security; management; critical infrastructure; cyber attacks;
    All these keywords.

    JEL classification:

    • D80 - Microeconomics - - Information, Knowledge, and Uncertainty - - - General
    • M15 - Business Administration and Business Economics; Marketing; Accounting; Personnel Economics - - Business Administration - - - IT Management
    • O33 - Economic Development, Innovation, Technological Change, and Growth - - Innovation; Research and Development; Technological Change; Intellectual Property Rights - - - Technological Change: Choices and Consequences; Diffusion Processes

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:ssi:jouesi:v:4:y:2017:i:4:p:559-573. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Manuela Tvaronaviciene (email available below). General contact details of provider: .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.