scholarly journals A Systematic Review of the State of Cyber-Security in Water Systems

Water ◽  
2021 ◽  
Vol 13 (1) ◽  
pp. 81
Author(s):  
Nilufer Tuptuk ◽  
Peter Hazell ◽  
Jeremy Watson ◽  
Stephen Hailes

Critical infrastructure systems are evolving from isolated bespoke systems to those that use general-purpose computing hosts, IoT sensors, edge computing, wireless networks and artificial intelligence. Although this move improves sensing and control capacity and gives better integration with business requirements, it also increases the scope for attack from malicious entities that intend to conduct industrial espionage and sabotage against these systems. In this paper, we review the state of the cyber-security research that is focused on improving the security of the water supply and wastewater collection and treatment systems that form part of the critical national infrastructure. We cover the publication statistics of the research in this area, the aspects of security being addressed, and future work required to achieve better cyber-security for water systems.

Author(s):  
Igor Diorditsa

The article proposes to consider the author's results of determining the conceptual provisions for optimizing the areas of administrative and legal regulation of state cybersecurity policy. The content of the current state of state policy in the field of cybersecurity is considered. Theoretical and practical aspects of optimization of legal relations in the field of state cybersecurity policy are analyzed. The interpretation of the state cybersecurity policy of Ukraine is determined – the activity of state and legal institutions to manage real and potential cyber threats and dangers to meet the cyber needs of man and citizen, as well as the realization of national interests in this area. The own vision of directions of the state cybersecurity policy according to the maintenance of a number of regulatory legal acts is offered, namely: directions of the state cybersecurity policy according to the Law of Ukraine «About the basic principles of maintenance of cybersecurity of Ukraine»; directions of the state cybersecurity policy in accordance with the Law of Ukraine «On Fundamentals of National Security of Ukraine»; directions of the state cybersecurity policy in accordance with the Doctrine of Information Security of Ukraine. It is concluded that the priority areas for optimizing state policy to strengthen the administrative and legal regulation of cybersecurity of the state are the following reforming cyber law as a segment of information legislation of Ukraine, especially in terms of not only clearly defining current threats and threats to cyber security, but also mechanisms public policy, including symmetric cyber measures; research on the protection of critical infrastructure from cyberattacks; promoting the development of domestic innovative products that can be used to strengthen the cybersecurity of the state; completion of the implementation of the provisions of the Council of Europe Convention on Cybercrime into national law; optimization of the training system in the field of cybersecurity for the needs of the Armed Forces of Ukraine and other bodies of the security and defense sector of Ukraine; promoting a more active policy of state security institutions to inform the public about cyber threats; promoting the militarization of cyberspace; support for both existing multilateral training sessions on countering cyberattacks on the state information infrastructure, and initiating new types of such training sessions. Key words:cybersecurity, cyberspace, state policy, cybersecurity policy, cybercrime.


2014 ◽  
pp. 1583-1597
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


Author(s):  
Barnabas W. Qurix ◽  
Lawrence C. Edomwonyi-Otu ◽  
Danjuma Jise

The paper makes a critical assessment of urban development in Nigeria against the backdrop of a rapidly changing population and growth rate. The Authors interrogated the effects of development control- mechanisms through the lenses of identified social anomalies in three selected pilot cities of Nigeria (Kaduna, Abuja FCT, and Lagos). Thematic areas examined include, the state of critical infrastructure, population dynamics, urban sprawl, city polarization, transportation, waste management systems, security/crime and economics. The Authors identified structural transformation of three Nigerian cities with focus on the causes and attendant consequences on urban development. The study found that urban growth has over-stretched the state of critical infrastructure in the cities and the mechanisms of development control seem ineffective in stemming unregulated growth, compromises and unplanned ‘development’. The paper noted that the impact of these developments has overstretched the state of critical infrastructure with far-reaching consequences. The authors conclude with some recommendations for strategic planning and sustainable development strategies aimed at mitigating the problems of urban development in Nigeria.


2012 ◽  
Vol 2 (4) ◽  
pp. 13-27 ◽  
Author(s):  
Joey Jansen van Vuuren ◽  
Louise Leenen ◽  
Jackie Phahlamohlaka ◽  
Jannie Zaaiman

A government has the responsibility to provide, regulate and maintain national security, which includes human security for its citizens. Recent declarations from the UK and USA governments about setting up cybersecurity organisations and the appointment of cyber czars reflect a global recognition that the Internet is part of the national critical infrastructure that needs to be safeguarded and protected. Although the South African government approved a draft National Cyber Security Policy Framework in March 2012, the country still needs a national cybersecurity governance structure in order to effectively control and protect its cyber infrastructure. Whilst various structures have been established to deal with cybersecurity in South Africa, they are inadequate and implementation of the policy is still in the very early stages. Structures need to be in place to set the security controls and policies and also to govern their implementation. It is important to have a holistic approach to cybersecurity, with partnerships between business, government and civil society put in place to achieve this goal. This paper investigates different government organisational structures created for the control of national cybersecurity in selected countries of the world. The main contribution is a proposed approach that South Africa could follow in implementing its proposed cybersecurity policy framework, taking into account the challenges of legislation and control of cybersecurity in Africa, and in particular, in South Africa.


2014 ◽  
Vol 91 (4) ◽  
pp. 43-55
Author(s):  
Scott Pittman

The story of anti-communism in California schools is a tale well and often told. But few scholars have appreciated the important role played by private surveillance networks. This article examines how privately funded and run investigations shaped the state government’s pursuit of leftist educators. The previously-secret papers of Major General Ralph H. Van Deman, which were opened to researchers at the National Archives in Washington, D.C., only a few years ago, show that the general operated a private spy network out of San Diego and fed information to military, federal, and state government agencies. Moreover, he taught the state government’s chief anti-communist bureaucrat, Richard E. Combs, how to recruit informants and monitor and control subversives. The case of the suspicious death of one University of California, Los Angeles student – a student that the anti-communists claimed had been “scared to death” by the Reds – shows the extent of the collaboration between Combs and Van Deman. It further illustrates how they conspired to promote fear of communism, influence hiring and firing of University of California faculty, and punish those educators who did not support their project. Although it was rarely successful, Combs’ and Van Deman’s coordinated campaign reveals a story of public-private anticommunist collaboration in California that has been largely forgotten. Because Van Deman’s files are now finally open to researchers, Californians can gain a much more complete understanding of their state bureaucracy’s role in the Red Scare purges of California educators.


2013 ◽  
Vol 62 (1) ◽  
pp. 23-31 ◽  
Author(s):  
Maria Mrówczyńska

Abstract The paper attempts to determine an optimum structure of a directional measurement and control network intended for investigating horizontal displacements. For this purpose it uses the notion of entropy as a logarithmical measure of probability of the state of a particular observation system. An optimum number of observations results from the difference of the entropy of the vector of parameters ΔHX̂ (x)corresponding to one extra observation. An increment of entropy interpreted as an increment of the amount of information about the state of the system determines the adoption or rejection of another extra observation to be carried out.


Author(s):  
Oleksandra Maslii ◽  
Andrii Maksymenko ◽  
Svitlana Onyshchenko

Place of monitoring and control of risks of financial stability of the state in the system of ensuring financial security of the state was substantiated. Methods of identifying threats to Ukraine's financial security through the current and strategic analysis of financial system development indicators were considered. Tendencies of economic development of Ukraine in the context of revealing sources of threats to financial stability of the state were analyzed. Dynamic analysis of the actual values of the financial security indicators of Ukraine as a whole and its separate components had been carried out. Threats to Ukraine's financial security were identified based on comparative and trend analysis. Reasons for the critical state of debt, banking and monetary security in the financial structure and the preconditions for the emergence of systemic threats had been investigated. Systematization of risks and threats to Ukraine's financial security by its components had been carried out. Influence of systemic threats in the financial sphere on the economic security of the state was generalized. International experience of monitoring financial stability of the state was analyzed. Additional risks to the national financial system are associated with the globalization and digitization of the state financial system that are not taken into account by valid methodological recommendations for calculating the level of economic security of Ukraine were highlighted.


Author(s):  
Zenoviy Siryk

Ukraine is a unitary state, yet historically various regions, oblasts, districts, and local areas have different levels of economic development. To secure sustainable economic and social development and provide social services guaranteed by the state for each citizen according to the Constitution, the mechanism of redistribution between revenues and expenditures of oblasts, regions, and territories through the budgets of a higher level is used. The paper aims to research the peculiarities of improving interbudgetary relations in conditions of authorities’ decentralization. The paper defines the nature of interbudgetary relations. The basic and reverse subsidies to Ukraine and Lvivska oblast are analyzed. The advantages and disadvantages the communities face at changing approaches to balancing local budgets are determined. Regulative documents that cover the interbudgetary relations in Ukraine are analyzed. Special attention is paid to the problem of local finances reforming, including the development of interbudgetary relations. The scheme of the economic interbudgetary relations system in Ukraine is developed. The ways to improve the system of interbudgetary relations in Ukraine are suggested. The negative and positive aspects, advantages, and disadvantages of the system of interbudgetary relations in Ukraine require the following improvements. 1. It is necessary to avoid the complete budget alignment in the process of budgets balancing by interbudgetary transfers as the major objective. 2. The interbudgetary transfers should be distributed based on a formal approach. 3. The changes have to be introduced to the calculation of medical and educational subsidies in terms of financial standard of budget provision to avoid the money deficit for coverage of necessary expenditures. 4. There is a need to improve interbudgetary relations at the levels of districts, villages, towns, and cities of district subordination. 5. Improvement of the mechanism of targeted benefits provision, their real evaluation, and control for the use of funds.


Sign in / Sign up

Export Citation Format

Share Document