Udroiu, Adriana MedaAdriana MedaUdroiuGânsac, VictorVictorGânsac2025-03-262025-03-262019https://dspace.apps.devcloud.ici.ro/handle/123456789/223This Research report tries to answer the question “What You Should Consider When Designing a Safe, Secure, and Reliable IoT Critical Infrastructure System?” and to assists Critical Infrastructures or other organizations, in strengthening their cybersecurity risk management by helping them to determine an appropriate implementation of the Framework for Improving Critical Infrastructure Cybersecurity. This document facilitates the strategies through five core functions: Identify, Protect, Detect, Respond, Recover.enCritical Infrastructure (CI)SCADA systemsInternet of Things (IoT)Security IssuesRisks and challengesCybersecurity FrameworkCyberthreats to critical infrastructure and IOTConference paperhttps://www.ceeol.com/search/chapter-detail?id=826980