Publication Cover
Criminal Justice Studies
A Critical Journal of Crime, Law and Society
Volume 35, 2022 - Issue 3
286
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Potential cyber-threats against Canada’s critical infrastructure: an investigation of online discussion forums

, , &
Pages 322-345 | Received 14 Sep 2021, Accepted 20 May 2022, Published online: 03 Jun 2022

References

  • Akers, R.L. (2009). Social learning and social structure: A general theory of crime and deviance. New York, NY: Transaction Publishers. ISBN 978-1-4128-0999-3.
  • Asghar, M.R., Hu, Q., & Zeadally, S. (2019). Cybersecurity in industrial control systems: Issues, technologies, and challenges. Computer Networks, 165, 106946.
  • Bossler, A. M. (2019). Perceived formal and informal sanctions on the willingness to commit cyber attacks against domestic and foreign targets. Journal of Crime and Justice, 42(5), 599–615. doi:10.1080/0735648X.2019.1692423
  • Bossler, A.M. (2021). Neutralizing cyber attacks: Techniques of neutralization and willingness to commit cyber attacks. American Journal of Criminal Justice, 46(6), 911–934.
  • Canadian Association of Defence and Security Industries. (2020). THE CYBER COLLABORATION IMPERATIVE: An overview of leading government industry collaboration models and practices in cyber defence.
  • Canadian Centre for Cyber Security. (2018). An introduction to the cyber threat environment. [Accessed 20 June 2020]. https://cyber.gc.ca/en/guidance/introduction-cyber-threat-environment
  • Coffey, K., Smith, R., Maglaras, L., & Janicke, H. (2018). Vulnerability analysis of network scanning on SCADA systems. Security and Communication Networks, 2018, 1–21.
  • de Laat, W. (2012). THE BEYOND THE BORDER ACTION PLAN: A TOOL FOR ENHANCED CANADA-U.S. COOPERATION ON CRITICAL INFRASTRUCTURE AND CYBER SECURITY - OR MORE WINDOW DRESSINC? 37(2), 19.
  • Deb, A., Lerman, K., & Ferrara, E. (2018). Predicting cyber-events by leveraging hacker sentiment. Information, 9(11), 280.
  • Dupont, B. (2017). Bots, cops, and corporations: On the limits of enforcement and the promise of polycentric regulation as a way to control large-scale cybercrime. Crime, Law, and Social Change, 67(1), 97–116.
  • Frank, R., Macdonald, M., & Monk, B. (2016).“Location, location, location: Mapping potential Canadian targets in online hacker discussion forums.” European Intelligence and Security Informatics Conference (EISIC). Uppsala, Sweden.
  • Genge, B., Kiss, I., & Haller, P. (2015). A system dynamic approach for assessing the impact of cyber attacks on critical infrastructures. International Journal of Critical Infrastructure Protection, 10, 3–17.
  • Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S., … Baker, T. (2018). Security threats to critical infrastructure: The human factor. The Journal of Supercomputing, 74(10), 4986–5002.
  • Goyal, P., Hossain, K.T., Deb, A., Tavabi, N., Bartley, N., Abeliuk, A., and Lerman, K. (2018). Discovering signals from web sources to predict cyber attacks. IEEE SYSTEMS. [Accessed June 15 2020]. ArXiv:1806.03342 [Cs, Stat] http://arxiv.org/abs/1806.03342
  • Graham, A. (2012). Canada’s critical infrastructure: When is safe enough safe enough?. Ottawa: The Macdonald-Laurier Institute. [Accessed June 10 2020]. Retrieved from https://www.macdonaldlaurier.ca/
  • Holt, T.J. (2007). subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198.
  • Holt, T.J., Burruss, G.W., & Bossler, A.M. (2010). SOCIAL LEARNING AND CYBER-DEVIANCE: EXAMINING THE IMPORTANCE OF A FULL SOCIAL LEARNING MODEL IN THE VIRTUAL WORLD. Journal of Crime and Justice, 33(2), 31–61.
  • Holt, T.J. (2012). Exploring the intersections of technology, crime, and terror. Terrorism and Political Violence, 24(2), 337–354.
  • Holt, T.J., & Bossler, A.M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
  • Kshetri, N., & Voas, J. (2017). Hacking power grids: A current problem. Computer, 50(12), 91–95.
  • Macaulay, T. (2008). Critical infrastructure: Understanding its component parts, vulnerabilities, operating risks, and interdependencies. Boca Raton, FL: CRC Press.
  • Macdonald, M., Frank, R., Mei, J., & Monk, B. (2015).“Identifying digital threats in a hacker web forum.” Advances in Social Networks Analysis and Mining (ASONAM), 2015 IEEE/ACM International Conference (pp. 926–933). Paris, France.
  • Mansfield-Devine, S. (2018). Critical infrastructure: Understanding the threat. Computer Fraud & Security, 7, 16–20.
  • Mazur, A., & Basa, J. (2020, August 18). Student information, financial info published in suspected RMC data leak after cyber attack. Global News. https://globalnews.ca/news/7283754/student-financial-rmc-data-leak-cyber-attack/
  • Nodeland, B., & Morris, R. (2020). A test of social learning theory and self-control on cyber offending. Deviant Behavior, 41(1), 41–56.
  • Office of Critical Infrastructure Protection and Emergency Preparedness. (2003). Threats to Canada’s critical infrastructure. Ottawa: Public Safety Canada.
  • Public Safety Canada. (2009). National Strategy for Critical Infrastructure. [Accessed June 11 2020]. https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/srtg-crtcl-nfrstrctr/srtg-crtcl-nfrstrctr-eng.pdf
  • Public Safety Canada. (2014). Action Plan for Critical Infrastructure (2014-2017). [Accessed June 20 2020]. https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/pln-crtcl-nfrstrctr-2014-17/index-en.aspx
  • Public Safety Canada. (2016). Fundamentals of Cyber Security for Canada’s CI Community. [Accessed June 21 2020]. https://www.publicsafety.gc.ca/cnt/rsrcs/pblctns/2016-fndmntls-cybr-scrty-cmmnty/index-en.aspx
  • Public Safety Canada. (2020). The regional resilience assessment program. [Accessed June 10 2020]. https://www.publicsafety.gc.ca/cnt/ntnl-scrt/crtcl-nfrstrctr/crtcl-nfrstrtr-rrap-en.aspx
  • Quigley, K., & Roy, J. (2012). Cyber-Security and risk management in an interoperable world: An examination of governmental action in North America. Social Science Computer Review, 30(1), 83–94.
  • Quigley, K. (2013). “Man plans, god laughs”: Canada’s national strategy for protecting critical infrastructure. poh. IS CANADIAN CI A TARGET? 29 Canadian Public Administration, 56(1), 142–164.
  • Rege‐Patwardhan, A. (2009). Cybercrimes against critical infrastructures: A study of online criminal organization and techniques. Criminal Justice Studies, 22(3), 261–271.
  • Rens, J. (2019). Survey of cybersecurity in Canadian manufacturing and critical infrastructure. Montreal, QC: Publisher not identified.
  • Rodofile, N.R., Radke, K., & Foo, E. (2019). Extending the cyber-attack landscape for SCADA-based critical infrastructure. International Journal of Critical Infrastructure Protection, 25, 14–35.
  • Rudner, M. (2009). Protecting Canada’s critical national infrastructure from terrorism: Mapping a proactive strategy for energy security. International Journal: Canada’s Journal of Global Policy Analysis, 64(3), 775–797.
  • Samtani, S., Chinn, R., Chen, H., & Nunamaker, J.F. (2017). Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence. Journal of Management Information Systems, 34(4), 1023–1053.
  • Samtani, S., Yu, S., Zhu, H., Patton, M., Matherly, J., & Chen, H. (2018). Identifying SCADA systems and their vulnerabilities on the internet of things: A text-mining approach. IEEE Intelligent Systems, 33(2), 63–73.
  • Shore, J.J.M. (2015). An obligation to act: Holding government accountable for critical infrastructure cyber security. International Journal of Intelligence and CounterIntelligence, 28(2), 236–251.
  • Stoney, C. (2019). Too critical to fail: How Canada manages threats to critical infrastructure Kevin quigley. Canadian Journal of Political Science, 52(4), 964–965. IS CANADIAN CI A TARGET? 30. Ben Bisset and Bryan Mills, Montreal and Kingston: McGill-Queen’s University Press, 2017, pp. 416.
  • Tariq, N., Asim, M., & Khan, F.A. (2019). Securing SCADA-based critical infrastructures: Challenges and open issues. Procedia Computer Science, 155, 612–617.
  • Yadav, T., & Rao, A.M. (2015). Technical aspects of cyber kill Chain. In J. Abawajy, S. Mukherjea, S. Thampi, & A. Ruiz-Martínez Eds., Security in computing and communications. SSCC 2015. Communications in computer and information science (Vol. 536, pp. 438–452). Cham: Springer International Publishing.[Accessed June 20 2020]. https://doi-org.proxy.lib.sfu.ca/10.1007/978-3-319-22915-7_40

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.