Potential cyber-attacks against global oil supply chain

@article{Nasir2015PotentialCA,
  title={Potential cyber-attacks against global oil supply chain},
  author={Muhammad Ali Nasir and Shizra Sultan and Samia Nefti-Meziani and Umar Manzoor},
  journal={2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA)},
  year={2015},
  pages={1-7}
}
The energy sector has been actively looking into cyber risk assessment at a global level, as it has a ripple effect; risk taken at one step in supply chain has an impact on all the other nodes. Cyber-attacks not only hinder functional operations in an organization but also waves damaging effects to the reputation and confidence among shareholders resulting in financial losses. Organizations that are open to the idea of protecting their assets and information flow and are equipped; enough to… Expand
Improving Critical Infrastructure Protection by Enhancing Software Acquisition Process Through Blockchain
TLDR
It can be concluded that Hyperledger Fabric blockchain provides necessary trust in a multi-party environment which is the basis for more efficient auditing of the whole process and the key enablers for a supply chain management process that can address the described needs. Expand
Modeling a Midstream Oil Terminal for Cyber Security Risk Evaluation
TLDR
This chapter describes the construction of a large, virtual, high-fidelity testbed that models a midstream oil terminal that demonstrates that large-scale models of industrial control systems for cyber security research are feasible and valuable. Expand

References

SHOWING 1-10 OF 36 REFERENCES
Addressing cyber security for the oil, gas and energy sector
The rapid spread of cyber threats and attacks are forcing many organizations to rethink their cyber security policies and standards. The latest cyber-attacks are well structured, organized, vicious,Expand
Addressing cyber security for the oil, gas and energy sector
The rapid spread of cyber threats and attacks are forcing many organizations to rethink their cyber security policies and standards. The latest cyber-attacks are well structured, organized, vicious,Expand
Cyber attacks against supply chain management systems: A short note
Supply chain management (SCM) is increasingly dependent on electronic systems. At the same time, the vulnerability of these systems to attack from malicious individuals or groups is growing. ThisExpand
Supply chain risk mitigation for IT electronics
TLDR
This work discusses techniques for defending against the range of threats, and proposes a practical solution based on a suite of simple, inexpensive test procedures that could be used to build an "80% solution" for detection of counterfeits and embedded malicious implants before they are deployed. Expand
Supply Chain Management Under The Threat Of International Terrorism
On the morning of September 11th, 2001, the United States and the Western world entered into a new era ‐ one in which large scale terrorist acts are to be expected. The impacts of the new era willExpand
A critical balance: collaboration and security in the IT-enabled supply chain
Integration of information flows facilitated by advances in information technology (IT) has increased collaboration across supply chains. However, benefits of interconnectivity are not gained withoutExpand
Assessing security risk in global supply chains
Supply chain security has become a primary concern for supply chain practitioners, and especially so for global supply chains where security related risk is a particular concern. The challenges ofExpand
Stuxnet and the Future of Cyber War
The discovery in June 2010 that a cyber worm dubbed ‘Stuxnet’ had struck the Iranian nuclear facility at Natanz suggested that, for cyber war, the future is now. Yet more important is the politicalExpand
Sources of Supply Chain Disruptions, Factors That Breed Vulnerability, and Mitigating Strategies
The focus of business toward increasing efficiency and reducing costs has resulted in supply chains that are efficient during normal times, but at the cost of being vulnerable to disruptions. FromExpand
Supply chain risk mitigation: modeling the enablers
TLDR
There exists a group of enablers having a high driving power and low dependence requiring maximum attention and of strategic importance while another group consists of those variables which have high dependence and are the resultant actions. Expand
...
1
2
3
4
...