Cyber Warfare in the context of Critical Infrastructures

Authors

  • João Marcos Barbosa Oliveira

Keywords:

: Cyber Warfare; Cyber Attack; Critical Infrastructure.

Abstract

The security of Critical Infrastructure (CI) is vital

for any nation. With the evolution of its

management as more and more computers,

networks, cloud, hardware, software and IT

infrastructure, the security of these assets has

become a critical area and needing them safely

is perhaps the most important aspect of your

security today. With this intention, it is

necessary to know how areas of CIs are most

vulnerable to this type of attack. In this context,

this article aimed to identify which CIs suffered

the most successful cyber attacks. A research

was carried out with the available literature on

the subject and according to the studies found it

was possible to conclude that the area of CI that

suffered the most successful cyber attacks is

Energy. The identification of this area serves the

members of the Army's Cyber Warfare System

as a basis for planning actions to exploit enemy

critical infrastructures.

Downloads

Download data is not yet available.

References

AKPINAR, Kevser Ovaz; OZCELIK, Ibrahim.

Analysis of machine learning methods in

EtherCAT-based anomaly detection. IEEE Access,

v. 7, p. 184365-184374, 2019.

AL-ABASSI, Abdulrahman et al. An Ensemble

Deep Learning-Based Cyber-Attack Detection in

Industrial Control System. IEEE Access, v. 8, p.

83965-83973, 2020.

ALEXANDROU, Alex. Cybercrime. International

and Transnational Crime and Justice, v. 10,

p. 61, 2019.

ALFORD, Lionel D. Cyber warfare: a new doctrine

and taxonomy. United States Air Force, 2001.

ARNOLD, Barry C. Pareto distribution. Wiley

StatsRef: Statistics Reference Online, p. 1-10,

2014.

AZMI, Ida Madieha Abdul Ghani; ZULHUDA,

Sonny; JAROT, Sigit Puspito Wigati. Data breach

on the critical information infrastructures:

lessons from the Wikileaks. Proceedings Title:

2012 International Conference on Cyber

Security, Cyber Warfare and Digital Forensic

(CyberSec). IEEE, 2012. p. 306-311.

BAYLON, Caroline. Lessons from Stuxnet and the

realm of cyber and nuclear security: implications

for ethics in cyber warfare. Ethics and Policies for

Cyber Operations. Springer, Cham , 2017. p.

213-229.

BLANK, Stephen. Cyber war and information war

a la russe. Understanding Cyber Conflict:

Fourteen Analogies, p. 1-18, 2017.

BODDY, Aaron et al. A study into data analysis

and visualisation to increase the cyber-resilience

of healthcare infrastructures. Proceedings of the

1st International Conference on Internet of

Things and Machine Learning. 2017. p. 1-7.

CARVALHO, Paulo Sérgio Melo de. A defesa

cibernética e as infraestruturas críticas nacionais.

Coleção Meira Mattos - Revista das Ciências

Militares, 2011.

CHEN, Thomas M. Stuxnet, the Real Start of

Cyber Warfare? IEEE Network, v. 24, no. 6,

2010, p. 2–3.

COLEMAN, Kevin. The weaponry and strategies of

digital conflict. International Conference on Cyber

Warfare and Security. Academic

Conferences International Limited, 2010. p. 491.

COLLINS, Aengus et al. The global risks report

2018. Genebra: Fórum Econômico Mundial. 2018.

CONOVALU, Sergiu; PARK, Joon S. Cybersecurity

Strategies for Smart Grids. Journal of Computers,

v. 11, n. 4, p. 300-309, 2016.

CZOSSECK, Christian; OTTIS, Rain; TALIHÄRM,

Anna-Maria. Estonia after the 2007 cyber

attacks: Legal, strategic and organisational

changes in cyber security. International Journal

of Cyber Warfare and Terrorism (IJCWT), v.

1, n. 1, p. 24-34, 2011.

DUIĆ, Igor; CVRTILA, Vlatko; IVANJKO,

Tomislav. International cyber security challenges.

In: 2017 40th International Convention on

Information and Communication Technology,

Electronics and Microelectronics (MIPRO). IEEE,

2017. p. 1309-1313.

EXÉRCITO BRASILEIRO. Comando de Operações

Terrestres. Manual de Campanha EB-70-MC-

10.232 Guerra Cibernética, Brasília: COTer,

2017.

HATHAWAY, Oona et al. The law of cyber-attack.

California Law Review, p. 817-885, 2012.

JENIK, Aviram. Cyberwar in Estonia and the

Middle East. Network Security, v. 2009, n. 4, p. 4

-6, 2009.

KATTEL, Prakash Jamar; AROS-VERA, Felipe.

Critical infrastructure location under supporting

station dependencies considerations. SocioEconomic Planning Sciences, v. 70, p.

100726, 2020.

KALECH, Meir. Cyber-attack detection in SCADA

systems using temporal pattern recognition

techniques. Computers & Security, v. 84, p. 225-

238, 2019.

KOETSEV, Viktor. Saudi Arabia in the firing line.

Petroleum Economist. 2019. Disponível em:

https://www.petroleum-economist.com/articles/

politics-economics/middle-east/2019/saudiarabia-in-the-firing-line. Acesso em: 05 Out. 20.

KITCHENHAM, Barbara; CHARTERS, Stuart.

Guidelines for performing systematic

literature reviews in software engineering.

EBSE Technical Report EBSE-2007-01, Keele

University e University of Durham. 2007.

KOVACEVIC, Ana; NIKOLIC, Dragana. Cyber

attacks on critical infrastructure: Review and

challenges. Handbook of Research on Digital

Crime, Cyberspace Security, and

Information Assurance. IGI Global, 2015. p. 1-

18.

LEE, Kyung-bok; LIM, Jong-in. The Reality and

Response of Cyber Threats to Critical

Infrastructure: A Case Study of the Cyber-terror

Attack on the Korea Hydro & Nuclear Power Co.,

Ltd. KSII Transactions on Internet & Information

Systems, v. 10, n. 2, 2016.

LIBICKI, Martin C. What is information warfare?.

National Defense Univ Washington DC Inst

for National Strategic Studies. 1995.

LO, Huai-Wei et al. A new soft computing

approach for analyzing the influential

relationships of critical infrastructures.

International Journal of Critical

Página 51

Página 52

Infrastructure Protection, v. 28, p. 100336,

2020.

MANDARINO JUNIOR., R. Segurança e defesa do

espaço cibernético brasileiro. Recife:

Cubzac, 2010.

MARTIN, Guy et al. Cybersecurity and

healthcare: how safe are we?. TheBMJ, v. 358,

2017.

MINISTÉRIO DA DEFESA. Forças Armadas.

Glossário das Forças Armadas - MD35-G-01,

5 ed., 2015.

MOȘOIU, Ovidiu. BĂLĂCEANU, Ion. MIHAI,

Eduard. Cyber Terrorism and the Effects of the

russian attacks on democratic States in East

Europe. Scientific Journal of Silesian University of

Technology, v. 106, 2020.

NICHOLSON, Andrew et al. SCADA security in the

light of Cyber-Warfare. Computers & Security, v.

31, n. 4, p. 418-436, 2012.

ONYEJI, Ijeoma; BAZILIAN, Morgan; BRONK,

Chris. Cyber security and critical energy

infrastructure. The Electricity Journal, v. 27, n. 2,

p. 52-60, 2014.

PARKS, Raymond C.; DUGGAN, David P.

Principles of cyberwarfare. IEEE Security &

Privacy, v. 9, n. 5, p. 30-35, 2011.

PASQUALETTI, Fabio, et al. Attack Detection and

Identification in Cyber-Physical Systems. IEEE

Transactions on Automatic Control, v. 58, n.

11, p. 2715–2729, 2013.

PROCTOR, Matt; SMITH, Terry. Lessons learned

from NERC CIP applied to the industrial world.

2017 70th Annual Conference for Protective

Relay Engineers (CPRE). IEEE, 2017. p. 1-6.

ROBINSON, Michael; JONES, Kevin; JANICKE,

Helge. Cyber warfare: issues and challenges.

Computers & security, v. 49, p. 70-94, 2015.

SHAHEEN, Salma. Offense–defense balance in

cyber warfare. Cyberspace and International

Relations. Springer, Berlin, Heidelberg,

2014. p. 77-93.

SHIRAZI, Syed Noorulhassan et al. Evaluation of

anomaly detection techniques for scada

communication resilience. 2016 Resilience Week

(RWS). IEEE, 2016. p. 140-145.

STEVENS, Clare. Assembling cybersecurity: The

politics and materiality of technical malware

reports and the case of Stuxnet. Contemporary

Security Policy, v. 41, n. 1, p. 129-152, 2020.

SUGUMAR, Gayathri; MATHUR, Aditya. Testing

the effectiveness of attack detection mechanisms

in industrial control systems. 2017 IEEE

International Conference on Software

Quality, Reliability and Security Companion

(QRS-C). IEEE, 2017. p. 138-145.

THAKUR, Kutub et al. Impact of cyber-attacks on

critical infrastructure. 2016 IEEE 2nd

International Conference on Big Data

Security on Cloud (BigDataSecurity. IEEE,

2016. p. 183-186.

UPADHYAY, Darshana; SAMPALLI, Srinivas.

SCADA (Supervisory Control and Data

Acquisition) systems: Vulnerability assessment

and security recommendations. Computers &

Security, v. 89, p. 101666, 2020.

TU, Haicheng et al. A Hybrid Cyber Attack Model

for Cyber-Physical Power Systems. IEEE Access,

v. 8, p. 114876-114883, 2020.

WEINBERGER, Sharon. How Israel Spoofed

Syria's Air Defense System.W ired, 4 de

Outubro, 2007. Disponível em: https://

www.wired.com/2007/10/how-israel-spoo/.

Acesso em: 05 set. 2020.

*Artigo realizado a partir do trabalho de

conclusão do Curso de Especialização em Guerra

Cibernética do Centro de Instrução de Guerra

Eletrônica em 2020 pelo 1º Ten Barbosa Oliveira,

instrutor do Curso de Comunicações do Centro de

Preparação de Oficiais da Reserva de São Paulo –

CPOR/SP. Endereço postal: Rua Alfredo Pujol,

681 - Santana - São Paulo/SP - CEP: 02017-011.

E-mail: barbosaoliveira.joao@eb.mil.br.

Published

2026-04-07

How to Cite

João Marcos Barbosa Oliveira. (2026). Cyber Warfare in the context of Critical Infrastructures. Data & Hertz, 2(2). Retrieved from https://ebrevistas.eb.mil.br/index.php/datahertz/article/view/14144