ESC
Clarivate

 
Source: Journal Citation ReportsTM from ClarivateTM 2022

Entrepreneurship and Sustainability Issues Open access
Journal Impact FactorTM (2022) 1.7
Journal Citation IndicatorTM (2022) 0.42
Received: 2017-02-18  |  Accepted: 2017-04-20  |  Published: 2017-06-30

Title

Cyber security management model for critical infrastructure


Abstract

Cyber security is the most critical aspect nowadays of our technologically based lives. Government institutions, banking sectors, public and private services, nuclear power plants, power grid operators, water suppliers or waste water treatment companies use information technologies in their day-to-day operations. Everything that uses technologies are based on communication and information systems and that means that it depends on cyber security. The public and private sector each year spend millions of dollars on technologies, security software and hardware devices that will increase the cyber security inside their companies, but they are still vulnerable. The main problem of this situation is that cyber security is still usually treated as a technical aspect or technology which can be easily implemented inside the organization and this implementation will guarantee cyber security. This attitude must change, because cyber security nowadays is something more than just the technology. This article presents the taxonomy of the critical infrastructure attacks, analyzes attack vectors and attack methods used to damage critical infrastructure as well as the most common cyber security mistakes which organizations make in the cyber security field when trying to make themselves safer from vulnerabilities. The main aim of this article is to provide theoretical aspects of the cyber security management model which can be used to ensure security of critical infrastructure in an organization or company. The cyber security management model that is presented in this article is analyzed from management perspectives and is not concerned with technological aspects and products that are used to protect critical infrastructure from cyber security attacks and vulnerabilities.


Keywords

cyber security, management, critical infrastructure, cyber attacks


JEL classifications

D80 , M15 , O33


URI

http://jssidoi.org/jesi/article/125


DOI


Pages

559-573


This is an open access issue and all published articles are licensed under a
Creative Commons Attribution 4.0 International License

Authors

Limba, Tadas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Plėta, Tomas
NATO Energy security center of excellence, Vilnius, Lithuania https://www.enseccoe.org
Articles by this author in: CrossRef |  Google Scholar

Agafonov, Konstantin
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Damkus, Martynas
Mykolas Romeris University, Vilnius, Lithuania https://www.mruni.eu
Articles by this author in: CrossRef |  Google Scholar

Journal title

Entrepreneurship and Sustainability Issues

Volume

4


Number

4


Issue date

June 2017


Issue DOI


ISSN

ISSN 2345-0282 (online)


Publisher

VšĮ Entrepreneurship and Sustainability Center, Vilnius, Lithuania

Cited

Google Scholar

Article views & downloads

HTML views: 6085  |  PDF downloads: 2770

References