𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cyber security risk assessment for SCADA and DCS networks

✍ Scribed by P.A.S. Ralston; J.H. Graham; J.L. Hieb


Publisher
Elsevier Science
Year
2007
Tongue
English
Weight
677 KB
Volume
46
Category
Article
ISSN
0019-0578

No coin nor oath required. For personal study only.

✦ Synopsis


The growing dependence of critical infrastructures and industrial automation on interconnected physical and cyber-based control systems has resulted in a growing and previously unforeseen cyber security threat to supervisory control and data acquisition (SCADA) and distributed control systems (DCSs). It is critical that engineers and managers understand these issues and know how to locate the information they need. This paper provides a broad overview of cyber security and risk assessment for SCADA and DCS, introduces the main industry organizations and government groups working in this area, and gives a comprehensive review of the literature to date. Major concepts related to the risk assessment methods are introduced with references cited for more detail. Included are risk assessment methods such as HHM, IIM, and RFRM which have been applied successfully to SCADA systems with many interdependencies and have highlighted the need for quantifiable metrics. Presented in broad terms is probability risk analysis (PRA) which includes methods such as FTA, ETA, and FEMA. The paper concludes with a general discussion of two recent methods (one based on compromise graphs and one on augmented vulnerability trees) that quantitatively determine the probability of an attack, the impact of the attack, and the reduction in risk associated with a particular countermeasure.


πŸ“œ SIMILAR VOLUMES


Risk assessment and management for suppl
✍ Gonca Tuncel; GΓΌlgΓΌn Alpan πŸ“‚ Article πŸ“… 2010 πŸ› Elsevier Science 🌐 English βš– 344 KB

The aim of this study is to show how a timed Petri nets framework can be used to model and analyze a supply chain (SC) network which is subject to various risks. The method is illustrated by an industrial case study. We first investigate the disruption factors of the SC network by a failure mode, ef