ISSN: 2222-6990
Open access
Critical National Infrastructure (CNI) within Oman is becoming Inter-independent to each other, aiming to provide unified and faultless services from the perspective of economics, quality, and governance. The new structure of interconnectivity between the CNI organizations has allowed sharing critical factors in benefiting from other CNI resources and services. Since this interconnectivity has permitted services and system to be more communicative and accessible via the internet, this has allowed some of the cyber threats to create a challenge to secure. Allowing such services to be available via the internet will also add to the fact that this services would be vulnerable to a variety of existing attacks.The latest global events related to Cyberterrorist attacks, have shown to the world how serious this matter.
In this article, we present a systematic approach after reviewing existing papers to building resilient cyber security networked systems. We first study fundamental elements of cyber security, cyberspace, CNI and its impact. Then we used qualitative methodology and case studies methods for better understanding the global incidents. This understanding drives the organizations of a distributed multilevel architecture that lets the network defend itself against, detect, and dynamically respond to upcoming challenges.
The recent attacks like operation petrol besides financial sector attacks in Oman shown the vulnerability of CNI system. In this case, we take the bank Muscat Visa attack as an example where they have announced that there visa credit card have been violated and a group of hackers compromised the system. To have better control and to handle on this matter, the management of such incidents should have been treated by a Cyber Center, who is well equipped and trained to handle this type of events. This paper proposes an innovative Cyber Security based approach for National Infrastructure Resiliency for Sultanate of Oman which can be used as a framework of initiating National Cyber Security Centre aiming to monitor and control the CNI cyber threats and increase the awareness and readiness within the related organization based on many published article and study in this field. Finally, this paper opens the door to establish this type of center in the country in addition to offers future research directions to develop and implement a new and useful technique in the field.
Bilge, L., & Dumitra?, T. (2012). Before we knew it: an empirical study of zero-day attacks in the real world. Proceedings of the 2012 ACM conference on Computer and communications security (833-844). ACM.
CERT-UK (2013). Coordination and Collaboration.Retrieved from:
CERT, ON (2010), Oman Natioanl CERT .Retrieved from
CERT US (2014). US Department of Homeland Security. Retrieved from
Cornish, P., Livingstone, D., Clemente, D., & Yorke, C. (2011). Cyber security and the UK’s critical national infrastructure.
Choo, K-KR (2010). 'High tech criminal threats to the national information infrastructure', ELSEVIER, vol. 15.Computer Fraud & Security ( 2001). Elsevier Science Ltd.
De Bruijne, M., & Van Eeten, M. (2007). Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. Journal of contingencies and crisis management, 15(1), 18-29.
Dehlawi, Z., & Abokhodair, N. (2013). Saudi Arabia's response to cyber conflict: A case study of the Shamoon malware incident. In 2013 IEEE International Conference on Intelligence and Security Informatics (pp. 73-75). IEEE.
Defense, USDo (2010). 'Quadrennial Defense Review Report', Washington DC: Government Printing Office, February.
Duroy, Q (2011), 'The Place of Biotechnology in Modern Civilization: A Veblenian Analysis of Public Misgiving Toward Embryology in the United States', Journal of Economic Issues, vol. 25, no. 3.
Ellen Nakashima, GMaJT (2012). The Washington
Post.
Foster Jr, J. S., Gjelde, E., Graham, W. R., Hermann, R. J., Kluepfel, H. M., Lawson, R. L., ... & Woodard, J. B. (2008). Report of the commission to assess the threat to the united states from electromagnetic pulse (emp) attack: Critical national infrastructures. electromagnetic pulse (emp) commission mclean va.
GAO (2007).'Cybercrime: Public and Private Entities Face Challenges is Addressing Cyber Threats', GAO-07-705, June 27, pp. 5 - 12.
Hill, G (2013), 'Eavesdropping on enterprise apps', sc magazine, October 15, pp. 1-2.
Kimberly K. Peretti , DePalo, M. (2013). Evolving DDoS Attacks Provide the Driver for Financial Institutions to Enhance Response Capabilitie , The Banking Law Journals, 513-515. A.S. Pratt & Sons Publication
Kushner, D (2013). 'The Real Story of Stuxnet', IEEE, p. 53.
Liang, G., Weller, S. R., Zhao, J., Luo, F., & Dong, Z. Y. (2017). The 2015 ukraine blackout: Implications for false data injection attacks. IEEE Transactions on Power Systems, 32(4), 3317-3318.
Labs, N (2013). NSS LABS,
Maher(2012).Retrievedfrom
Map(2013).Digital Attack Map, December 26,
OilVoice (2011). The Top 5 Oil Super Majors, August 20,
Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE control systems magazine, 21(6), 11-25.
Singh, A. N., Gupta, M. P., & Ojha, A. (2014). Identifying critical infrastructure sectors and their dependencies: An Indian scenario. International Journal of Critical Infrastructure Protection, 7(2), 71-85.
Shakarian, P., Shakarian, J., & Ruef, A. (2013). Introduction to cyber-warfare: A multidisciplinary approach. Newnes.
Stevens, T. (2013). Cyberspace and national security: threats, opportunities, and power in a virtual world SDA(2012).Security Defence Agenda,
In-Text Citation: (Mughairi, Hajri, Karim, & Hossain, 2019)
To Cite this Article: Mughairi, B. M. Al, Hajri, H. H. Al, Karim, A. M., & Hossain, M. I. (2019). An Innovative Cyber Security based Approach for National Infrastructure Resiliency for Sultanate of Oman. International Journal Academic Research Business and Social Sciences, 9(3), 1180–1195.
Copyright: © 2019 The Author(s)
Published by Human Resource Management Academic Research Society (www.hrmars.com)
This article is published under the Creative Commons Attribution (CC BY 4.0) license. Anyone may reproduce, distribute, translate and create derivative works of this article (for both commercial and non-commercial purposes), subject to full attribution to the original publication and authors. The full terms of this license may be seen at: http://creativecommons.org/licences/by/4.0/legalcode