Literature DB >> 17624350

Cyber security risk assessment for SCADA and DCS networks.

P A S Ralston1, J H Graham, J L Hieb.   

Abstract

The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.

Entities:  

Year:  2007        PMID: 17624350     DOI: 10.1016/j.isatra.2007.04.003

Source DB:  PubMed          Journal:  ISA Trans        ISSN: 0019-0578            Impact factor:   5.468


  5 in total

1.  Feature Sequencing Method of Industrial Control Data Set Based on Multidimensional Evaluation Parameters.

Authors:  Xue-Jun Liu; Xiang-Min Kong; Xiao-Ni Zhang; Hai-Ying Luan; Yong Yan; Yun Sha; Kai-Li Li; Xue-Ying Cao; Jian-Ping Chen
Journal:  Comput Intell Neurosci       Date:  2022-04-28

2.  AVQS: attack route-based vulnerability quantification scheme for smart grid.

Authors:  Jongbin Ko; Hyunwoo Lim; Seokjun Lee; Taeshik Shon
Journal:  ScientificWorldJournal       Date:  2014-07-24

Review 3.  Industrial IoT, Cyber Threats, and Standards Landscape: Evaluation and Roadmap.

Authors:  Lubna Luxmi Dhirani; Eddie Armstrong; Thomas Newe
Journal:  Sensors (Basel)       Date:  2021-06-05       Impact factor: 3.576

4.  A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks.

Authors:  Aamir Shahzad; Malrey Lee; Neal Naixue Xiong; Gisung Jeong; Young-Keun Lee; Jae-Young Choi; Abdul Wheed Mahesar; Iftikhar Ahmad
Journal:  Sensors (Basel)       Date:  2016-03-03       Impact factor: 3.576

5.  A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols.

Authors:  Aamir Shahzad; René Landry; Malrey Lee; Naixue Xiong; Jongho Lee; Changhoon Lee
Journal:  Sensors (Basel)       Date:  2016-06-14       Impact factor: 3.576

  5 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.