Guerra Cibernética no contexto das Infraestruturas Críticas
Palabras clave:
Guerra Cibernética; Ataque Cibernético; Infraestruturas Críticas.Resumen
A proteção das Infraestruturas Críticas (IC) é
vital para qualquer nação. Com a evolução de
sua gestão dependendo cada vez mais de
computação, redes, nuvem, hardware, software
e infraestrutura de TI, a segurança desses ativos
tem se tornado uma área crítica e mantê-los
seguros talvez seja o aspecto mais importante
de sua segurança hoje. Com a finalidade de se
obter êxito na sua proteção é necessário
conhecer as áreas de IC mais vulneráveis a esse
tipo de ataque. Neste contexto, este artigo teve
como objetivo identificar quais as áreas de IC
que mais sofreram ataques exitosos de Guerra
Cibernética. Foi realizada uma pesquisa na
literatura disponível sobre o assunto e a partir
dos estudos encontrados pôde-se concluir que a
área de IC que mais sofreu ataques cibernéticos
exitosos é a de Energia. A identificação dessa
área serve aos integrantes do Sistema de Guerra
Cibernética do Exército (SGCEx) como base para
o planejamento de ações de exploração das
infraestruturas críticas inimigas.
Descargas
Citas
AKPINAR, Kevser Ovaz; OZCELIK, Ibrahim.
Analysis of machine learning methods in
EtherCAT-based anomaly detection. IEEE Access,
v. 7, p. 184365-184374, 2019.
AL-ABASSI, Abdulrahman et al. An Ensemble
Deep Learning-Based Cyber-Attack Detection in
Industrial Control System. IEEE Access, v. 8, p.
83965-83973, 2020.
ALEXANDROU, Alex. Cybercrime. International
and Transnational Crime and Justice, v. 10,
p. 61, 2019.
ALFORD, Lionel D. Cyber warfare: a new doctrine
and taxonomy. United States Air Force, 2001.
ARNOLD, Barry C. Pareto distribution. Wiley
StatsRef: Statistics Reference Online, p. 1-10,
2014.
AZMI, Ida Madieha Abdul Ghani; ZULHUDA,
Sonny; JAROT, Sigit Puspito Wigati. Data breach
on the critical information infrastructures:
lessons from the Wikileaks. Proceedings Title:
2012 International Conference on Cyber
Security, Cyber Warfare and Digital Forensic
(CyberSec). IEEE, 2012. p. 306-311.
BAYLON, Caroline. Lessons from Stuxnet and the
realm of cyber and nuclear security: implications
for ethics in cyber warfare. Ethics and Policies for
Cyber Operations. Springer, Cham , 2017. p.
213-229.
BLANK, Stephen. Cyber war and information war
a la russe. Understanding Cyber Conflict:
Fourteen Analogies, p. 1-18, 2017.
BODDY, Aaron et al. A study into data analysis
and visualisation to increase the cyber-resilience
of healthcare infrastructures. Proceedings of the
1st International Conference on Internet of
Things and Machine Learning. 2017. p. 1-7.
CARVALHO, Paulo Sérgio Melo de. A defesa
cibernética e as infraestruturas críticas nacionais.
Coleção Meira Mattos - Revista das Ciências
Militares, 2011.
CHEN, Thomas M. Stuxnet, the Real Start of
Cyber Warfare? IEEE Network, v. 24, no. 6,
2010, p. 2–3.
COLEMAN, Kevin. The weaponry and strategies of
digital conflict. International Conference on Cyber
Warfare and Security. Academic
Conferences International Limited, 2010. p. 491.
COLLINS, Aengus et al. The global risks report
2018. Genebra: Fórum Econômico Mundial. 2018.
CONOVALU, Sergiu; PARK, Joon S. Cybersecurity
Strategies for Smart Grids. Journal of Computers,
v. 11, n. 4, p. 300-309, 2016.
CZOSSECK, Christian; OTTIS, Rain; TALIHÄRM,
Anna-Maria. Estonia after the 2007 cyber
attacks: Legal, strategic and organisational
changes in cyber security. International Journal
of Cyber Warfare and Terrorism (IJCWT), v.
1, n. 1, p. 24-34, 2011.
DUIĆ, Igor; CVRTILA, Vlatko; IVANJKO,
Tomislav. International cyber security challenges.
In: 2017 40th International Convention on
Information and Communication Technology,
Electronics and Microelectronics (MIPRO). IEEE,
2017. p. 1309-1313.
EXÉRCITO BRASILEIRO. Comando de Operações
Terrestres. Manual de Campanha EB-70-MC-
10.232 Guerra Cibernética, Brasília: COTer,
2017.
HATHAWAY, Oona et al. The law of cyber-attack.
California Law Review, p. 817-885, 2012.
JENIK, Aviram. Cyberwar in Estonia and the
Middle East. Network Security, v. 2009, n. 4, p. 4
-6, 2009.
KATTEL, Prakash Jamar; AROS-VERA, Felipe.
Critical infrastructure location under supporting
station dependencies considerations. SocioEconomic Planning Sciences, v. 70, p.
100726, 2020.
KALECH, Meir. Cyber-attack detection in SCADA
systems using temporal pattern recognition
techniques. Computers & Security, v. 84, p. 225-
238, 2019.
KOETSEV, Viktor. Saudi Arabia in the firing line.
Petroleum Economist. 2019. Disponível em:
https://www.petroleum-economist.com/articles/
politics-economics/middle-east/2019/saudiarabia-in-the-firing-line. Acesso em: 05 Out. 20.
KITCHENHAM, Barbara; CHARTERS, Stuart.
Guidelines for performing systematic
literature reviews in software engineering.
EBSE Technical Report EBSE-2007-01, Keele
University e University of Durham. 2007.
KOVACEVIC, Ana; NIKOLIC, Dragana. Cyber
attacks on critical infrastructure: Review and
challenges. Handbook of Research on Digital
Crime, Cyberspace Security, and
Information Assurance. IGI Global, 2015. p. 1-
18.
LEE, Kyung-bok; LIM, Jong-in. The Reality and
Response of Cyber Threats to Critical
Infrastructure: A Case Study of the Cyber-terror
Attack on the Korea Hydro & Nuclear Power Co.,
Ltd. KSII Transactions on Internet & Information
Systems, v. 10, n. 2, 2016.
LIBICKI, Martin C. What is information warfare?.
National Defense Univ Washington DC Inst
for National Strategic Studies. 1995.
LO, Huai-Wei et al. A new soft computing
approach for analyzing the influential
relationships of critical infrastructures.
International Journal of Critical
Página 51
Página 52
Infrastructure Protection, v. 28, p. 100336,
2020.
MANDARINO JUNIOR., R. Segurança e defesa do
espaço cibernético brasileiro. Recife:
Cubzac, 2010.
MARTIN, Guy et al. Cybersecurity and
healthcare: how safe are we?. TheBMJ, v. 358,
2017.
MINISTÉRIO DA DEFESA. Forças Armadas.
Glossário das Forças Armadas - MD35-G-01,
5 ed., 2015.
MOȘOIU, Ovidiu. BĂLĂCEANU, Ion. MIHAI,
Eduard. Cyber Terrorism and the Effects of the
russian attacks on democratic States in East
Europe. Scientific Journal of Silesian University of
Technology, v. 106, 2020.
NICHOLSON, Andrew et al. SCADA security in the
light of Cyber-Warfare. Computers & Security, v.
31, n. 4, p. 418-436, 2012.
ONYEJI, Ijeoma; BAZILIAN, Morgan; BRONK,
Chris. Cyber security and critical energy
infrastructure. The Electricity Journal, v. 27, n. 2,
p. 52-60, 2014.
PARKS, Raymond C.; DUGGAN, David P.
Principles of cyberwarfare. IEEE Security &
Privacy, v. 9, n. 5, p. 30-35, 2011.
PASQUALETTI, Fabio, et al. Attack Detection and
Identification in Cyber-Physical Systems. IEEE
Transactions on Automatic Control, v. 58, n.
11, p. 2715–2729, 2013.
PROCTOR, Matt; SMITH, Terry. Lessons learned
from NERC CIP applied to the industrial world.
2017 70th Annual Conference for Protective
Relay Engineers (CPRE). IEEE, 2017. p. 1-6.
ROBINSON, Michael; JONES, Kevin; JANICKE,
Helge. Cyber warfare: issues and challenges.
Computers & security, v. 49, p. 70-94, 2015.
SHAHEEN, Salma. Offense–defense balance in
cyber warfare. Cyberspace and International
Relations. Springer, Berlin, Heidelberg,
2014. p. 77-93.
SHIRAZI, Syed Noorulhassan et al. Evaluation of
anomaly detection techniques for scada
communication resilience. 2016 Resilience Week
(RWS). IEEE, 2016. p. 140-145.
STEVENS, Clare. Assembling cybersecurity: The
politics and materiality of technical malware
reports and the case of Stuxnet. Contemporary
Security Policy, v. 41, n. 1, p. 129-152, 2020.
SUGUMAR, Gayathri; MATHUR, Aditya. Testing
the effectiveness of attack detection mechanisms
in industrial control systems. 2017 IEEE
International Conference on Software
Quality, Reliability and Security Companion
(QRS-C). IEEE, 2017. p. 138-145.
THAKUR, Kutub et al. Impact of cyber-attacks on
critical infrastructure. 2016 IEEE 2nd
International Conference on Big Data
Security on Cloud (BigDataSecurity. IEEE,
2016. p. 183-186.
UPADHYAY, Darshana; SAMPALLI, Srinivas.
SCADA (Supervisory Control and Data
Acquisition) systems: Vulnerability assessment
and security recommendations. Computers &
Security, v. 89, p. 101666, 2020.
TU, Haicheng et al. A Hybrid Cyber Attack Model
for Cyber-Physical Power Systems. IEEE Access,
v. 8, p. 114876-114883, 2020.
WEINBERGER, Sharon. How Israel Spoofed
Syria's Air Defense System.W ired, 4 de
Outubro, 2007. Disponível em: https://
www.wired.com/2007/10/how-israel-spoo/.
Acesso em: 05 set. 2020.
*Artigo realizado a partir do trabalho de
conclusão do Curso de Especialização em Guerra
Cibernética do Centro de Instrução de Guerra
Eletrônica em 2020 pelo 1º Ten Barbosa Oliveira,
instrutor do Curso de Comunicações do Centro de
Preparação de Oficiais da Reserva de São Paulo –
CPOR/SP. Endereço postal: Rua Alfredo Pujol,
681 - Santana - São Paulo/SP - CEP: 02017-011.
E-mail: barbosaoliveira.joao@eb.mil.br.
Publicado
Cómo citar
Número
Sección
Licencia
Derechos de autor 2026 Data & Hertz

Esta obra está bajo una licencia internacional Creative Commons Atribución-NoComercial-SinDerivadas 4.0.
Atribución-NoComercial-CompartirIgual 4.0 Internacional (CC BY-NC-SA 4.0)
- Atribución (BY): Debe dar crédito de manera adecuada.
- NoComercial (NC): No permite el uso de la obra con fines comerciales.
- CompartirIgual (SA): Si se remezcla ou transforma el material, debe distribuir sus contribuciones bajo la misma licencia.