Dr. Amir Esmaeily

Download 195.8 Kb.
View original pdf
Size195.8 Kb.
1   2   3   4   5   6   7
project proposal Muhammad
Research Questions

1. What are the impacts malware attacks have had on the global energy sector?
2. What mechanisms can be developed to accelerate the energy sector's response to malware attacks?
3. How can diverse stakeholder interests in the energy sector align with the sector's need to respond robustly to malware attacks?
4. What role should the public and private sector entities play in developing an energy delivery ecosystem that responds adequately to malware attacks?
Theoretical Framework

Remarkably, this paper will examine the historical context, existing conditions, and stakeholder perspectives in the global energy sector to determine the obstacles to cooperation and collaboration efforts that make it vulnerable to cybersecurity threats such as malware. With this objective in mind, it will utilize the Enterprise Architecture Theory to analyze the electricity and gas sub-sectors within the context of enterprises. According to Bernus, Noran, and Molina (2015), the Enterprise Architecture Theory is concerned with creating, communicating, and improving the key requirements of an enterprise's state to enable its future evolution. In other words, at the heart of the theory is the idea that an effective business architecture strategy is the key to driving transformational change at the organizational level.
This theoretical framework will allow the researcher to promptly identify gaps in the sector's cyber-threat response mechanism by looking at the energy sector as an enterprise.

Malware Threats to the Energy Sector
Literature Review

Various studies have been conducted to assess the reasons behind the energy sector's vulnerability to malware attacks. According to Venkatachary, Prasad, and Samikannu (2018), malware attacks against power plants and clean-energy generators, especially in the developed world, are because legacy generation systems adopted within the aforementioned clean-energy infrastructure are often not designed with cybersecurity in mind. A study by Sullivan and
Kamensky (2017) takes a similar position, opining that the existing physical security weaknesses witnessed in power transmission allow malicious actors to access grid control systems. Moroever, Sullivan and Kamensky (2017) mention that the energy sector has, over the past few days, integrated most of its processes with the Internet of Things (IoT) technologies, subsequently increasing cyber-attack surfaces. In this precarious environment,
Onyeji, Bazilian, and Bronk (2014) note that the threat landscape has expanded significantly in recent years and today includes new players like nation-state actors who have demonstrated their willingness to target and disrupt daily life in the pursuit of nationalist goals and other nefarious agendas. Apart from nation-state actors in the cybersecurity landscape, individuals and activist groups still possess the capacity to disrupt various functions in the energy sector, including gas operations and electric-power transmission. Another key point worth mentioning is that these threats are increasing when inconsistencies still exist in the capacity of utility companies to secure the appropriate funding and deploy the necessary personnel needed to build security systems that can stand the test of time and serve both present and future needs.

Download 195.8 Kb.

Share with your friends:
1   2   3   4   5   6   7

The database is protected by copyright ©ininet.org 2023
send message

    Main page