𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Cyber security vulnerability analysis: An asset-based approach

✍ Scribed by Paul Baybutt


Book ID
105359092
Publisher
American Institute of Chemical Engineers
Year
2003
Tongue
English
Weight
891 KB
Volume
22
Category
Article
ISSN
1066-8527

No coin nor oath required. For personal study only.

✦ Synopsis


Abstract

This paper describes a method for identifying and analyzing threats and vulnerabilities of process plants to cyber system attacks by terrorists, saboteurs, and other criminals, and provides an example of its use. The approach considers how cyber assets can be exploited by assailants to cause harm. It defines threat events by pairing threats with cyber assets, and considers vulnerabilities to attack, existing countermeasures, and the need for new or improved countermeasures.

Previous security vulnerability analysis (SVA) methods have focused on physical and personnel security. Cyber security has not been explicitly addressed. Studies using the method described can be performed as adjuncts to existing SVAs, as part of future SVAs, or as stand‐alone cyber SVAs (CSVA). The method can also be used to consider all types of security issues in a single analysis, including physical, personnel, information and cyber security, or to study any of these areas individually.


πŸ“œ SIMILAR VOLUMES