Cybersecurity in the Petroleum Industry: A Comprehensive Review of Threats and Mitigation Strategies

., Akpan,U.E. and ., Okoye.O. (2024) Cybersecurity in the Petroleum Industry: A Comprehensive Review of Threats and Mitigation Strategies. Journal of Engineering Research and Reports, 26 (12). pp. 261-270. ISSN 2582-2926

[thumbnail of Akpan26122024JERR126308.pdf] Text
Akpan26122024JERR126308.pdf - Published Version

Download (287kB)

Abstract

The reliance of the petroleum industry on digital technologies is on the increase. This increase has introduced significant cyber security risks, threatening operations, safety, and the environment. This review examines the current state of cyber security in the petroleum industry, highlighting the range of threats, including phishing, ransom ware, OT-specific risks, like attacks on SCADA and ICS systems, and industrial control system attacks. It also assesses the effectiveness of countermeasures, such as risk assessment, incident response planning, employee training, and advanced security measures like AI and machine learning. The study emphasizes the importance of compliance with industry-specific standards and certification, continuous monitoring, and adaptation to emerging technologies and evolving threats. Some of the cyber security standards and protocols include NIST, ISO/IEC 27001 and CIS. Their duties include provide guidelines to assist organizations in conducting appropriate and effective management and mitigation of risks, establishing a sound information security management system that focuses on safeguarding sensitive data and outline a prioritized method by which one could guard against common cyber threats, putting an emphasis on key areas of security, access control, and response to incidents respectively. This review aims to inform and guide the petroleum industry in strengthening its cyber security posture and ensuring the resilience of its operations as well as this review serves as a guide for leadership on resilience and proactive threat management, addressing critical vulnerabilities.

Item Type: Article
Subjects: STM Digital > Engineering
Depositing User: Unnamed user with email support@stmdigital.org
Date Deposited: 08 Jan 2025 04:23
Last Modified: 08 Jan 2025 04:23
URI: http://elibrary.ths100.in/id/eprint/1594

Actions (login required)

View Item
View Item