E3S Web Conf.
Volume 266, 2021Topical Issues of Rational Use of Natural Resources 2021
|Number of page(s)||10|
|Section||Information Telecommunication Technologies and Digital Transformation|
|Published online||04 June 2021|
Cybersecurity in complex operations: a post-drilling approach foroil and gas wells
1 Oil and Gas Drilling Department, Oil and Gas Faculty, Ukhta State Technical University, Russia
2 Department of Modern Well Drilling Technologies, Faculty of Exploration Technology and Development, Russian State Geological Exploration University, Russia
Many companies are now workingto converge business models and engineering processes with the technologies of the fourth industrial revolution. The automation of industrial processes together with the implementationof infrastructure,makes it possible to interconnect people and performance indicators in real-time, reducing the decision-making time and time in themarketplace. This provides companies with unprecedented opportunities to create and capture value while rethinking business models but brings vulnerabilities and risks that must be properly assessed and mitigated. New malicious third parties are emerging and directly threaten the efforts of companies. The purpose of this article is to enumerate the possible attackers (vectors) and to define the possible areas where they can attack companies (surfaces), illustratingwith the example of drilling operations in the oil and gas industry, in order to provide discussion points about what new competencies technicians need to developto face these emerging threats.
© The Authors, published by EDP Sciences, 2021
Initial download of the metrics may take a while.