Guerra Cibernética no contexto das Infraestruturas Críticas

Autores/as

  • João Marcos Barbosa Oliveira

Palabras clave:

Guerra Cibernética; Ataque Cibernético; Infraestruturas Críticas.

Resumen

A proteção das Infraestruturas Críticas (IC) é

vital para qualquer nação. Com a evolução de

sua gestão dependendo cada vez mais de

computação, redes, nuvem, hardware, software

e infraestrutura de TI, a segurança desses ativos

tem se tornado uma área crítica e mantê-los

seguros talvez seja o aspecto mais importante

de sua segurança hoje. Com a finalidade de se

obter êxito na sua proteção é necessário

conhecer as áreas de IC mais vulneráveis a esse

tipo de ataque. Neste contexto, este artigo teve

como objetivo identificar quais as áreas de IC

que mais sofreram ataques exitosos de Guerra

Cibernética. Foi realizada uma pesquisa na

literatura disponível sobre o assunto e a partir

dos estudos encontrados pôde-se concluir que a

área de IC que mais sofreu ataques cibernéticos

exitosos é a de Energia. A identificação dessa

área serve aos integrantes do Sistema de Guerra

Cibernética do Exército (SGCEx) como base para

o planejamento de ações de exploração das

infraestruturas críticas inimigas.

Descargas

Los datos de descargas todavía no están disponibles.

Citas

AKPINAR, Kevser Ovaz; OZCELIK, Ibrahim.

Analysis of machine learning methods in

EtherCAT-based anomaly detection. IEEE Access,

v. 7, p. 184365-184374, 2019.

AL-ABASSI, Abdulrahman et al. An Ensemble

Deep Learning-Based Cyber-Attack Detection in

Industrial Control System. IEEE Access, v. 8, p.

83965-83973, 2020.

ALEXANDROU, Alex. Cybercrime. International

and Transnational Crime and Justice, v. 10,

p. 61, 2019.

ALFORD, Lionel D. Cyber warfare: a new doctrine

and taxonomy. United States Air Force, 2001.

ARNOLD, Barry C. Pareto distribution. Wiley

StatsRef: Statistics Reference Online, p. 1-10,

2014.

AZMI, Ida Madieha Abdul Ghani; ZULHUDA,

Sonny; JAROT, Sigit Puspito Wigati. Data breach

on the critical information infrastructures:

lessons from the Wikileaks. Proceedings Title:

2012 International Conference on Cyber

Security, Cyber Warfare and Digital Forensic

(CyberSec). IEEE, 2012. p. 306-311.

BAYLON, Caroline. Lessons from Stuxnet and the

realm of cyber and nuclear security: implications

for ethics in cyber warfare. Ethics and Policies for

Cyber Operations. Springer, Cham , 2017. p.

213-229.

BLANK, Stephen. Cyber war and information war

a la russe. Understanding Cyber Conflict:

Fourteen Analogies, p. 1-18, 2017.

BODDY, Aaron et al. A study into data analysis

and visualisation to increase the cyber-resilience

of healthcare infrastructures. Proceedings of the

1st International Conference on Internet of

Things and Machine Learning. 2017. p. 1-7.

CARVALHO, Paulo Sérgio Melo de. A defesa

cibernética e as infraestruturas críticas nacionais.

Coleção Meira Mattos - Revista das Ciências

Militares, 2011.

CHEN, Thomas M. Stuxnet, the Real Start of

Cyber Warfare? IEEE Network, v. 24, no. 6,

2010, p. 2–3.

COLEMAN, Kevin. The weaponry and strategies of

digital conflict. International Conference on Cyber

Warfare and Security. Academic

Conferences International Limited, 2010. p. 491.

COLLINS, Aengus et al. The global risks report

2018. Genebra: Fórum Econômico Mundial. 2018.

CONOVALU, Sergiu; PARK, Joon S. Cybersecurity

Strategies for Smart Grids. Journal of Computers,

v. 11, n. 4, p. 300-309, 2016.

CZOSSECK, Christian; OTTIS, Rain; TALIHÄRM,

Anna-Maria. Estonia after the 2007 cyber

attacks: Legal, strategic and organisational

changes in cyber security. International Journal

of Cyber Warfare and Terrorism (IJCWT), v.

1, n. 1, p. 24-34, 2011.

DUIĆ, Igor; CVRTILA, Vlatko; IVANJKO,

Tomislav. International cyber security challenges.

In: 2017 40th International Convention on

Information and Communication Technology,

Electronics and Microelectronics (MIPRO). IEEE,

2017. p. 1309-1313.

EXÉRCITO BRASILEIRO. Comando de Operações

Terrestres. Manual de Campanha EB-70-MC-

10.232 Guerra Cibernética, Brasília: COTer,

2017.

HATHAWAY, Oona et al. The law of cyber-attack.

California Law Review, p. 817-885, 2012.

JENIK, Aviram. Cyberwar in Estonia and the

Middle East. Network Security, v. 2009, n. 4, p. 4

-6, 2009.

KATTEL, Prakash Jamar; AROS-VERA, Felipe.

Critical infrastructure location under supporting

station dependencies considerations. SocioEconomic Planning Sciences, v. 70, p.

100726, 2020.

KALECH, Meir. Cyber-attack detection in SCADA

systems using temporal pattern recognition

techniques. Computers & Security, v. 84, p. 225-

238, 2019.

KOETSEV, Viktor. Saudi Arabia in the firing line.

Petroleum Economist. 2019. Disponível em:

https://www.petroleum-economist.com/articles/

politics-economics/middle-east/2019/saudiarabia-in-the-firing-line. Acesso em: 05 Out. 20.

KITCHENHAM, Barbara; CHARTERS, Stuart.

Guidelines for performing systematic

literature reviews in software engineering.

EBSE Technical Report EBSE-2007-01, Keele

University e University of Durham. 2007.

KOVACEVIC, Ana; NIKOLIC, Dragana. Cyber

attacks on critical infrastructure: Review and

challenges. Handbook of Research on Digital

Crime, Cyberspace Security, and

Information Assurance. IGI Global, 2015. p. 1-

18.

LEE, Kyung-bok; LIM, Jong-in. The Reality and

Response of Cyber Threats to Critical

Infrastructure: A Case Study of the Cyber-terror

Attack on the Korea Hydro & Nuclear Power Co.,

Ltd. KSII Transactions on Internet & Information

Systems, v. 10, n. 2, 2016.

LIBICKI, Martin C. What is information warfare?.

National Defense Univ Washington DC Inst

for National Strategic Studies. 1995.

LO, Huai-Wei et al. A new soft computing

approach for analyzing the influential

relationships of critical infrastructures.

International Journal of Critical

Página 51

Página 52

Infrastructure Protection, v. 28, p. 100336,

2020.

MANDARINO JUNIOR., R. Segurança e defesa do

espaço cibernético brasileiro. Recife:

Cubzac, 2010.

MARTIN, Guy et al. Cybersecurity and

healthcare: how safe are we?. TheBMJ, v. 358,

2017.

MINISTÉRIO DA DEFESA. Forças Armadas.

Glossário das Forças Armadas - MD35-G-01,

5 ed., 2015.

MOȘOIU, Ovidiu. BĂLĂCEANU, Ion. MIHAI,

Eduard. Cyber Terrorism and the Effects of the

russian attacks on democratic States in East

Europe. Scientific Journal of Silesian University of

Technology, v. 106, 2020.

NICHOLSON, Andrew et al. SCADA security in the

light of Cyber-Warfare. Computers & Security, v.

31, n. 4, p. 418-436, 2012.

ONYEJI, Ijeoma; BAZILIAN, Morgan; BRONK,

Chris. Cyber security and critical energy

infrastructure. The Electricity Journal, v. 27, n. 2,

p. 52-60, 2014.

PARKS, Raymond C.; DUGGAN, David P.

Principles of cyberwarfare. IEEE Security &

Privacy, v. 9, n. 5, p. 30-35, 2011.

PASQUALETTI, Fabio, et al. Attack Detection and

Identification in Cyber-Physical Systems. IEEE

Transactions on Automatic Control, v. 58, n.

11, p. 2715–2729, 2013.

PROCTOR, Matt; SMITH, Terry. Lessons learned

from NERC CIP applied to the industrial world.

2017 70th Annual Conference for Protective

Relay Engineers (CPRE). IEEE, 2017. p. 1-6.

ROBINSON, Michael; JONES, Kevin; JANICKE,

Helge. Cyber warfare: issues and challenges.

Computers & security, v. 49, p. 70-94, 2015.

SHAHEEN, Salma. Offense–defense balance in

cyber warfare. Cyberspace and International

Relations. Springer, Berlin, Heidelberg,

2014. p. 77-93.

SHIRAZI, Syed Noorulhassan et al. Evaluation of

anomaly detection techniques for scada

communication resilience. 2016 Resilience Week

(RWS). IEEE, 2016. p. 140-145.

STEVENS, Clare. Assembling cybersecurity: The

politics and materiality of technical malware

reports and the case of Stuxnet. Contemporary

Security Policy, v. 41, n. 1, p. 129-152, 2020.

SUGUMAR, Gayathri; MATHUR, Aditya. Testing

the effectiveness of attack detection mechanisms

in industrial control systems. 2017 IEEE

International Conference on Software

Quality, Reliability and Security Companion

(QRS-C). IEEE, 2017. p. 138-145.

THAKUR, Kutub et al. Impact of cyber-attacks on

critical infrastructure. 2016 IEEE 2nd

International Conference on Big Data

Security on Cloud (BigDataSecurity. IEEE,

2016. p. 183-186.

UPADHYAY, Darshana; SAMPALLI, Srinivas.

SCADA (Supervisory Control and Data

Acquisition) systems: Vulnerability assessment

and security recommendations. Computers &

Security, v. 89, p. 101666, 2020.

TU, Haicheng et al. A Hybrid Cyber Attack Model

for Cyber-Physical Power Systems. IEEE Access,

v. 8, p. 114876-114883, 2020.

WEINBERGER, Sharon. How Israel Spoofed

Syria's Air Defense System.W ired, 4 de

Outubro, 2007. Disponível em: https://

www.wired.com/2007/10/how-israel-spoo/.

Acesso em: 05 set. 2020.

*Artigo realizado a partir do trabalho de

conclusão do Curso de Especialização em Guerra

Cibernética do Centro de Instrução de Guerra

Eletrônica em 2020 pelo 1º Ten Barbosa Oliveira,

instrutor do Curso de Comunicações do Centro de

Preparação de Oficiais da Reserva de São Paulo –

CPOR/SP. Endereço postal: Rua Alfredo Pujol,

681 - Santana - São Paulo/SP - CEP: 02017-011.

E-mail: barbosaoliveira.joao@eb.mil.br.

Publicado

2026-04-07

Cómo citar

João Marcos Barbosa Oliveira. (2026). Guerra Cibernética no contexto das Infraestruturas Críticas. Data & Hertz, 2(2). Recuperado a partir de https://ebrevistas.eb.mil.br/index.php/datahertz/article/view/14144

Número

Sección

Artigos