{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:24:48Z","timestamp":1774610688635,"version":"3.50.1"},"reference-count":20,"publisher":"Walter de Gruyter GmbH","issue":"1","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,3,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning and resilient critical infrastructure. An organization identified as the Cybersecurity and Infrastructure Security Agency (CISA) at the Department of Homeland Security (DHS) has the mission to be the risk advisor for the United States (US). Other organizations, such as the National Security Agency (NSA), have approved a specific Knowledge Unit (KU) to address cybersecurity for critical infrastructures associated with doctoral-level granting programs. To address this challenge, it is necessary to identify threats better and defend against them while mitigating risks to an acceptable level. Only then can a nation build a more secure and resilient infrastructure for the future while defending against present-day bad actors as cyberwarfare, cyber espionage, and cybersecurity attacks are the modern-day threats that need to be addressed in planning, designing, implementation, and maintenance. Therefore, the researchers developed a case study reviewing threats against different sectors defined in the PPD.<\/jats:p>","DOI":"10.2478\/raft-2021-0011","type":"journal-article","created":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T09:25:55Z","timestamp":1615454755000},"page":"69-75","source":"Crossref","is-referenced-by-count":43,"title":["Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors"],"prefix":"10.2478","volume":"26","author":[{"given":"Maurice","family":"Dawson","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology , Chicago , United States of America"}]},{"given":"Robert","family":"Bacius","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology , Chicago , United States of America"}]},{"given":"Luis Borges","family":"Gouveia","sequence":"additional","affiliation":[{"name":"University Fernando Pessoa , Porto , Portugal"}]},{"given":"Andreas","family":"Vassilakos","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology , Chicago , United States of America"}]}],"member":"374","published-online":{"date-parts":[[2021,3,5]]},"reference":[{"key":"2025012416072894479_j_raft-2021-0011_ref_001_w2aab3b7c22b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"Bhattacharjee, S., Salimitari, M., Chatterjee, M., Kwiat, K., & Kamhoua, C. (2017, November). Preserving data integrity in iot networks under opportunistic data manipulation. IEEE 15th Intl Conf on Dependable, Autonomic and Secure Computing, 15th Intl Conf on Pervasive Intelligence and Computing, 3rd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech), 446-453.10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.87","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2017.87"},{"key":"2025012416072894479_j_raft-2021-0011_ref_002_w2aab3b7c22b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"Bracho, A., Saygin, C., Wan, H., Lee, Y., & Zarreh, A. (2018). A simulation-based platform for assessing the impact of cyber-threats on smart manufacturing systems. Procedia Manufacturing, Vol. 26, 1116-1127.10.1016\/j.promfg.2018.07.148","DOI":"10.1016\/j.promfg.2018.07.148"},{"key":"2025012416072894479_j_raft-2021-0011_ref_003_w2aab3b7c22b1b6b1ab1ab3Aa","doi-asserted-by":"crossref","unstructured":"Copos, B., Levitt, K., Bishop, M., & Rowe, J. (2016, May). Is anybody home? Inferring activity from smart home network traffic. IEEE Security and Privacy Workshops (SPW), 245-251.10.1109\/SPW.2016.48","DOI":"10.1109\/SPW.2016.48"},{"key":"2025012416072894479_j_raft-2021-0011_ref_004_w2aab3b7c22b1b6b1ab1ab4Aa","unstructured":"Dawson, M. (2018). Cyber security in industry 4.0: The pitfalls of having hyperconnected systems. Journal of Strategic Management Studies, Vol. 10, Issue 1, 19-28."},{"key":"2025012416072894479_j_raft-2021-0011_ref_005_w2aab3b7c22b1b6b1ab1ab5Aa","doi-asserted-by":"crossref","unstructured":"Denning, D.E. (2012). Stuxnet: What has changed?. Future Internet, Vol. 4, Issue 3, 672-687.10.3390\/fi4030672","DOI":"10.3390\/fi4030672"},{"key":"2025012416072894479_j_raft-2021-0011_ref_006_w2aab3b7c22b1b6b1ab1ab6Aa","unstructured":"Department of Homeland Security. (2014). Section 10(a) and 10(b) Report on the United States Coast Guard (USCG) and Maritime Critical Infrastructure Cybersecurity Standards, Section 10(b) Report on the Department of Homeland Security\u2019s Chemical Facility Anti-Terrorism Standards (CFATS). Section 10(b) Report on the Transportation Security Administration\u2019s (TSA\u2019s) Approach to Voluntary Industry Adoption of the NIST. Author."},{"key":"2025012416072894479_j_raft-2021-0011_ref_007_w2aab3b7c22b1b6b1ab1ab7Aa","unstructured":"Friedman, A.A., Mack-Crane, A., & Hammond, R.A. (2013). Cyber-enabled Competitive Data Theft: A Framework for Modeling Long-Run Cybersecurity Consequences. Center for Technology Innovation at Brookings."},{"key":"2025012416072894479_j_raft-2021-0011_ref_008_w2aab3b7c22b1b6b1ab1ab8Aa","doi-asserted-by":"crossref","unstructured":"Ge, X., Ye, J., Yang, Y., & Li, Q. (2016). User mobility evaluation for 5G small cell networks based on individual mobility model. IEEE Journal on Selected Areas in Communications, Vol. 34, Issue 3, 528-541.10.1109\/JSAC.2016.2525439","DOI":"10.1109\/JSAC.2016.2525439"},{"key":"2025012416072894479_j_raft-2021-0011_ref_009_w2aab3b7c22b1b6b1ab1ab9Aa","unstructured":"Lewis, J.A. (2002). Assessing the risks of cyber terrorism, cyber war and other cyber threats. Washington, DC: Center for Strategic & International Studies."},{"key":"2025012416072894479_j_raft-2021-0011_ref_010_w2aab3b7c22b1b6b1ab1ac10Aa","unstructured":"Lewis, B.K. (2012). Social Media and Strategic Communications: Attitudes and perceptions Among College Students (Doctoral Dissertation). ProQuest Dissertations and Thesis Full Texts Database. Oklahoma State University, available at: http:\/\/www.prsa.org\/Intelligence\/PRJournal\/Documents\/2012LewisNichols.pdf, accessed on 13 September 2020."},{"key":"2025012416072894479_j_raft-2021-0011_ref_011_w2aab3b7c22b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"Lichtman, M., Rao, R., Marojevic, V., Reed, J., & Jover, R. P. (2018, May). 5G NR jamming, spoofing, and sniffing: threat assessment and mitigation. IEEE International Conference on Communications Workshops (ICC Workshops), 1-6.10.1109\/ICCW.2018.8403769","DOI":"10.1109\/ICCW.2018.8403769"},{"key":"2025012416072894479_j_raft-2021-0011_ref_012_w2aab3b7c22b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"Munro, K. (2012). Deconstructing flame: the limitations of traditional defences. Computer Fraud & Security, Vol. 10, 8-11.10.1016\/S1361-3723(12)70102-1","DOI":"10.1016\/S1361-3723(12)70102-1"},{"key":"2025012416072894479_j_raft-2021-0011_ref_013_w2aab3b7c22b1b6b1ab1ac13Aa","unstructured":"National Institute of Standards and Technology (NIST). (2014). Framework for Improving Critical Infrastructure Cybersecurity. United States of America."},{"key":"2025012416072894479_j_raft-2021-0011_ref_014_w2aab3b7c22b1b6b1ab1ac14Aa","unstructured":"Obama, B. (2013). Executive order 13636: Improving critical infrastructure cybersecurity. Federal Register, Vol. 78, Issue 33, 11739."},{"key":"2025012416072894479_j_raft-2021-0011_ref_015_w2aab3b7c22b1b6b1ab1ac15Aa","unstructured":"Robles, R.J., Choi, M.K., Cho, E.S., Kim, S.S., Park, G., & Lee, J. (2008). Common threats and vulnerabilities of critical infrastructures. International Journal of Control and Automation, Vol. 1, Issue 1, 17-22."},{"key":"2025012416072894479_j_raft-2021-0011_ref_016_w2aab3b7c22b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"Tang, L., Jing, K., He, J., & Stanley, H. E. (2016). Complex interdependent supply chain networks: Cascading failure and robustness. Physica A: Statistical Mechanics and its Applications, Vol. 443, 58-69.10.1016\/j.physa.2015.09.082","DOI":"10.1016\/j.physa.2015.09.082"},{"key":"2025012416072894479_j_raft-2021-0011_ref_017_w2aab3b7c22b1b6b1ab1ac17Aa","unstructured":"The White House. (2014). Assessing Cybersecurity Regulations. Available at: http:\/\/m.whitehouse.gov\/blog\/2014\/05\/22\/assessing-cybersecurity-regulations, accessed on 14 September 2020"},{"key":"2025012416072894479_j_raft-2021-0011_ref_018_w2aab3b7c22b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"Ullah, H., Nair, N.G., Moore, A., Nugent, C., Muschamp, P., & Cuevas, M. (2019). 5G communication: an overview of vehicle-to-everything, drones, and healthcare use-cases. IEEE Access, Vol. 7, 37251-3726810.1109\/ACCESS.2019.2905347","DOI":"10.1109\/ACCESS.2019.2905347"},{"key":"2025012416072894479_j_raft-2021-0011_ref_019_w2aab3b7c22b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"Wells, L.J., Camelio, J.A., Williams, C.B., & White, J. (2014). Cyber-physical security challenges in manufacturing systems. Manufacturing Letters, Vol. 2, Issues 2, 74-77.10.1016\/j.mfglet.2014.01.005","DOI":"10.1016\/j.mfglet.2014.01.005"},{"key":"2025012416072894479_j_raft-2021-0011_ref_020_w2aab3b7c22b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"Wilson, C. (2014). Cyber Threats to Critical Information Infrastructure. Cyberterrorism, 123-136.10.1007\/978-1-4939-0962-9_7","DOI":"10.1007\/978-1-4939-0962-9_7"}],"container-title":["Land Forces Academy Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/raft\/26\/1\/article-p69.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/raft-2021-0011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,24]],"date-time":"2025-01-24T16:07:46Z","timestamp":1737734866000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.sciendo.com\/article\/10.2478\/raft-2021-0011"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,1]]},"references-count":20,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2021,3,5]]},"published-print":{"date-parts":[[2021,3,1]]}},"alternative-id":["10.2478\/raft-2021-0011"],"URL":"https:\/\/doi.org\/10.2478\/raft-2021-0011","relation":{},"ISSN":["2247-840X"],"issn-type":[{"value":"2247-840X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,1]]}}}