Our society’s critical infrastructures (CI) —energy, water, transportation, communication, information infrastructure —lacks of resilience, typically losing essential functionality following adverse occasions. Later on, the amount of weather extremes may intensify or be frequent, and building resilience becomes the perfect plan of action for big complex systems. CI are cyber-physical systems (CPS) more and more using open systems for operation. The vulnerabilities from the software deployed within the new control system infrastructure will expose the control system to a lot of potential risks and threats from attackers. CPS have grown to be a significant position for development and research. However, all CPS will also be sociotechnical systems (STS), as well as for effective integration with society, the sociotechnical dimension of CPS ought to be addressed. The prospective of the paper would be to research how resilience control over critical systems could be understood. The research signifies that situational awareness, continuous learning and also the sociotechnical dimension of CPS are prerequisites for just about any CI to get resilient.
Cyber security, Critical infrastructure, Critical infrastructure protection, Resilience, Sociotechnical system, Cyber-Physical system, Software-Intensive System, System of systems
 I. Linkov, T. Bridges, F. Creutzig, J. Decker, C. Fox-Given, W. Kröger, J. H. Lambert, A. Levermann, B. Montreuil, J. Nathwani, R. Nyer, O. Renn, B. Scharte, A. Scheffler, M. Schreurs and T. ThielClemen, “;Changing the resilience paradigm,” Nature Climat Change, vol. 4, pp. 407-409, 2014.
 P. Bosch, “;RESIN: Resilient Metropolitan areas and Infrastructures,” European CIIP E-newsletter, vol. 9, no. 3, pp. 15-16, 2015.
 M. Sveda, “;Dependability in CyberPhysical Systems Network Applications,” in Latest Trends in Circuits, Systems, Signal Processing and Automatic Control, Salerno, 2014.
 L. Lukas and M. Hromada, “;Management of protection of Czech Republic critical infrastructure elements,” in Proceedings from the 13th WSEAS worldwide conference on Automatic control, modelling & simulatio, 2011.
 H. S. Ariane Hellinger, Cyber-Physical Systems. Driving pressure for innovation in mobility, health, energy and production, 2011.
 A. Hevner and S. Chatterjee, Design Science Research in Computer, Springer, 2010.
 J. Rajamäki, “;Towards a Design Theory for Resilient (Sociotechnical, CyberPhysical, Software-intensive and Systems of) Systems,” in Recent Advances in Information Science, Barcelona, 2016.
 M. Jamshidi, Systems of Systems Engineering: principle and applications, CRC Press, 2009.
 R. McMillan, “;Siemens: Stuxnet earthworm hit industrial systems,” Sept. 2010.[Online]. Available: http://www.computerworld.com/s/article/ print/9185419.[Utilized 18 March 2016].
 S. Greengard, “;The new face of war,” Commun. ACM, vol. 53, no. 12, pp. 20-22, 2010.
 B. Krebs, “;Cyber incident blamed for nuclear power plant shutdown,” Washington Publish, June 2008.[Online]. Available: http://www.washingtonpost.com/wpdyn/content/article/2008/06/05/AR200806 0501958.html.[Utilized 18 March 2016].
 S. Gorman, “;Electricity grid in U.S. permeated by spies,” Wall Str. J., April 2009.[Online]. Available: http://online.wsj.com/article/SB12391480 5204099085.html.[Utilized 18 March 2016].
 A. Cardenas, S. Amin and S. Sastry, “;Securecontrol:Towards survivablecyberphysicalsystems,” in Proceedings oftheTwenty-Eighth Worldwide Conferenceon Distributed Computing Systems Workshops, 2008.
 Y. Liu, P. Ning and M. Reiter, “; False data injection attacks against condition estimation in electrical power grids,” in Proceedings from the Sixteenth ACM Conference on Computer and Communications Security, 2009.
 C. Li, A. Raghunathan and N. Jha, “;Hijacking an insulin pump: Security attacks and defenses for any diabetes therapy system,” in Proceedings from the Thirteenth IEEE Worldwide Conference on eHealth Networking Services and applications, 2011.
 J. Radcliffe, “;Hacking medical devices just for fun and insulin: Smashing the human SCADA system,” within the Spammy Technical Security Conference USA, 2011.
 D. Shepard, J. Bhattiand and T. Humphreys, “;Dronehack: Spoofing attack demonstration on the civilian unmanned aerial vehicle,” Gps navigation World, 1 August 2012.
 A. Hahn, R. Thomas, I. Lozano along with a. Cardenas, “;A multi-layered and kill-chain based security analysis framework for cyber-physical systems,” Internal Journal of Critical Infrastructure Protection, vol. 11, pp. 39-50, 2015.
 Q. Zhu and T. Basar, “;Game-Theoretic Means of Sturdiness, Security, and Resilience of Cyberphysical Control Systems: Games-in-Games Principle for Optimal Mix-Layer Resilient Control Systems,” IEEE Control Systems, vol. 35, no. 1, pp. 46-65, 2015.
 M. Ilic, “;From hierarchical to spread out access electrical power systems,” Proc. IEEE, vol. 95, no. 5, pp. 1060-1084, 2007.
 W. Lee and S. Jang, “;A study information security management system model for medium and small enterprises,” Recent Advances in E-Activities, Information Privacy and security, pp. 84- 87, 2009.
 J. S. Broderick, “;ISMS, security standards and security rules,” Information Security Technical Report, vol. 11, pp. 26- 31, 2006.
 M. Siponen and R. Willison, “;Information security management standards: Problems and solutions,” Information & Management, vol. 46, pp. 267-270, 2009.
Cite this paper