Abstract
Many utilities have adopted digital technologies to bring the required efficiency in their operations and meet the stakeholder requirements. As part of these digitization initiatives, the organizations have implemented multiple state of the art technologies which have helped them to improve and deliver quality services. Although implementation of latest technologies have brought numerous advantages to the utilities but it has also brought a unique challenge in the form of Cybersecurity. As power distribution utilities host nation’s Critical Information Infrastructure, it becomes imperative for utilities to ensure all required measures are in place to protect them from any kind of misadventure from Cyber adversaries. In view of above, many utilities have implemented various controls covering all aspects of People, Process and Technology. But it seems that a gap still exists which is not covered by standard approach. A survey of recent cyber-attacks on CII has revealed that a lot of advance and modern utilities have been a successful target of such malicious campaigns. The reason for utilities to become victim of such campaigns seems to be due to lack of legal framework for protection of Critical Information Infrastructure. It is also required that accountability for protection of CII at multiple stages should be recognized along with stringent review mechanisms. This paper shall focus on approaches adopted by various cyber instruments to curb crimes and what strategy needs to be adopted by nations to protect CII from falling victim to malicious campaigns by cyber adversaries who are based out of different geopolitical location.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Abbreviations
- ADMS:
-
Advance Distribution Management system
- CII:
-
Critical Information Infrastructure
- CPS:
-
Cyber Physical System
- CERT-In:
-
Indian Computer Emergency Response Team
- FRTU:
-
Field Remote Terminal Unit
- ICS:
-
Industrial Control Systems
- IT:
-
Information Technology
- NBA:
-
Network Behaviour Analysis
- NCIIPC:
-
National Critical Information Infrastructure Protection Centre
- OT:
-
Operation Technology
- OS:
-
Operating System
- PLC:
-
Programmable Logic Controller
- RTU:
-
Remote Terminal Unit
- SCADA:
-
Supervisory Control and Data Acquisition
- US-CERT:
-
United States Computer Emergency Readiness
- SPOC:
-
Special Point of Contact
- ERP:
-
Enterprise Resource Planning
- BCM:
-
Business Communication Manager
- CRM:
-
Customer Relationship Manager
- PI:
-
Process Integration
- GIS:
-
Geographic Information System
- SCADA:
-
Supervisory Control and Data Acquisition
- FFA:
-
Field Force Automation
- ESB:
-
Enterprise Service Bus
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Batra, T., Khan, A.H., Samanta, S. (2022). Legal Framework for Protection of Critical Information Infrastructure. In: Pillai, R.K., Singh, B.P., Murugesan, N. (eds) ISUW 2021. Lecture Notes in Electrical Engineering, vol 843. Springer, Singapore. https://doi.org/10.1007/978-981-16-8727-3_1
Download citation
DOI: https://doi.org/10.1007/978-981-16-8727-3_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-8726-6
Online ISBN: 978-981-16-8727-3
eBook Packages: EnergyEnergy (R0)