Reference Hub3
Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts

Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts

Toufic Mezher, Sameh El Khatib, Thilanka Maduwanthi Sooriyaarachchi
Copyright: © 2015 |Volume: 5 |Issue: 3 |Pages: 18
ISSN: 1947-3435|EISSN: 1947-3443|EISBN13: 9781466678934|DOI: 10.4018/IJCWT.2015070101
Cite Article Cite Article

MLA

Mezher, Toufic, et al. "Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts." IJCWT vol.5, no.3 2015: pp.1-18. http://doi.org/10.4018/IJCWT.2015070101

APA

Mezher, T., El Khatib, S., & Sooriyaarachchi, T. M. (2015). Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts. International Journal of Cyber Warfare and Terrorism (IJCWT), 5(3), 1-18. http://doi.org/10.4018/IJCWT.2015070101

Chicago

Mezher, Toufic, Sameh El Khatib, and Thilanka Maduwanthi Sooriyaarachchi. "Cyberattacks on Critical Infrastructure and Potential Sustainable Development Impacts," International Journal of Cyber Warfare and Terrorism (IJCWT) 5, no.3: 1-18. http://doi.org/10.4018/IJCWT.2015070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Because of advancement in information and communication technologies, modern infrastructure systems are currently operated, monitored and controlled by automated systems such as distributed process control networks and supervisory control and data acquisition. Such systems will make the critical infrastructures in any country vulnerable to failures caused by either operational failures or to potential cyberattacks similar to Stuxnet and Night Dragon. The objective of this paper is to shed the light on the synergy between cybersecurity and sustainable development in relation to the potential social, economic, and environment consequences of potential cybersecurity attacks on critical infrastructures. Examples of both operational and cybersecurity incidents are shown including their sustainable development implications.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.