Peer Reviewed Journal via three different mandatory reviewing processes, since 2006, and, from September 2020, a fourth mandatory peer-editing has been added.
Critical Infrastructures (CIs) are complex systems. For their
operations, these infrastructures are increasingly using
Supervisory Control And Data Acquisition (SCADA) systems.
Management practices are therefore highly dependent on the
cyber tools, but also on the data needed to make these tools
work. Therefore, CIs are greatly vulnerable to degradation of
data.
In this context, this paper aims at presenting the fundamentals of
a method for analyzing the vulnerabilities of CIs towards the use
of cyber data. By characterizing cyber vulnerability of CIs, it
will be possible to improve the resilience of these networks and
to foster a proactive approach to risk management not only by
considering cybernetics from a cyber-attack point of view but
also by considering the consequences of the use of corrupted
data.