2019
DOI: 10.1108/ics-04-2018-0048
|View full text |Cite
|
Sign up to set email alerts
|

A review of security assessment methodologies in industrial control systems

Abstract: Purpose The common implementation practices of modern industrial control systems (ICS) has left a window wide open to various security vulnerabilities. As the cyber-threat landscape continues to evolve, the ICS and their underlying architecture must be protected to withstand cyber-attacks. This study aims to review several ICS security assessment methodologies to identify an appropriate vulnerability assessment method for the ICS systems that examine both critical physical and cyber systems so as to protect th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0
1

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(12 citation statements)
references
References 27 publications
0
11
0
1
Order By: Relevance
“…Several research works have analyzed and assessed the vulnerabilities of SCADA communication protocols [52], [53], [54], [55], [56]. Table IV summarizes several protocol shortcomings that make it vulnerable to cyber threats.…”
Section: B Security Objectives and Vulnerabilitiesmentioning
confidence: 99%
“…Several research works have analyzed and assessed the vulnerabilities of SCADA communication protocols [52], [53], [54], [55], [56]. Table IV summarizes several protocol shortcomings that make it vulnerable to cyber threats.…”
Section: B Security Objectives and Vulnerabilitiesmentioning
confidence: 99%
“…The guarantee of availability, confidentiality and integrality of this technology in the electricity industry depends on a structured IS governance (Qassim et al, 2019). Moreover, the risks faced in environments with critical infrastructure, like transport, electricity and telecommunications, have cyber attacks as main threat (Kure et al, 2018).…”
Section: Information Security Governance In the Electricity Industrymentioning
confidence: 99%
“…Hibridni metodi kombinuju prethodno opisane pristupe, na primer, stručnu procenu sa nekim od kvantitativnih metoda [13], [14]. Sistematičan pregled metoda za procenu bezbednosnog rizika u ICS sistemima koji koriste tradicionalne Internet tehnologije može se pronaći u [15] i [16].…”
Section: Slika 1 Ilustracija Procesa Procene Bezbednosnog Rizika U Icsunclassified