2005
DOI: 10.2202/1547-7355.1117
|View full text |Cite
|
Sign up to set email alerts
|

A Roadmap for Quantifying the Efficacy of Risk Management of Information Security and Interdependent SCADA Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
23
0

Year Published

2005
2005
2018
2018

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 0 publications
0
23
0
Order By: Relevance
“…The outputs are represented in two different metrics, economic inoperability measured in dollars lost and percentage of dysfunctionality. Haimes and Chittester [70] use this method to quantify economic losses and their propagation through the various economic sectors for large scale civil infrastructures controlled by SCADA systems over IP based communication networks. They present a case study demonstrating the effects of a perturbation to the telecommunications sector by way of cyber intrusion.…”
Section: Published Research On Overall Risk Assessmentmentioning
confidence: 99%
“…The outputs are represented in two different metrics, economic inoperability measured in dollars lost and percentage of dysfunctionality. Haimes and Chittester [70] use this method to quantify economic losses and their propagation through the various economic sectors for large scale civil infrastructures controlled by SCADA systems over IP based communication networks. They present a case study demonstrating the effects of a perturbation to the telecommunications sector by way of cyber intrusion.…”
Section: Published Research On Overall Risk Assessmentmentioning
confidence: 99%
“…We adapt the framework proposed by Haimes and Chittister (2005) in quantifying the net benefit of available risk management options. Let the notation i ¼ 1,2,. .…”
Section: Evaluating the Efficacy Of Risk Managementmentioning
confidence: 99%
“…These may include the availability and capability of manpower in charge of the deployment and operations of the selected policy options, as well as the extent to which risk managers respond and adapt to the continuously evolving nature of disasters (Haimes and Chittister, 2005). Applying such factors to the formulation shown in equation (6), the IIM equation can be customized to take into account the application of risk management policies.…”
Section: Evaluating the Efficacy Of Risk Managementmentioning
confidence: 99%
“…Such modeling and simulation abilities are integral to infrastructure risk analyses. Haimes, Kaplan, and Lambert (2002) describe a risk filtering, ranking, and management method (RFRM), which builds on the HHM (Haimes & Chittester, 2005) to identify risks, but then filters and ranks the risks so that the risks can be addressed in the order of priority. Haimes and Chittester (2005) use inoperability input-output modeling (IIM) to quantify economic losses and their propagation through the various economic sectors for large-scale civil infrastructures controlled by SCADA systems over internet protocol communication networks.…”
Section: Risk Assessment Of Critical Systemsmentioning
confidence: 99%
“…Haimes, Kaplan, and Lambert (2002) describe a risk filtering, ranking, and management method (RFRM), which builds on the HHM (Haimes & Chittester, 2005) to identify risks, but then filters and ranks the risks so that the risks can be addressed in the order of priority. Haimes and Chittester (2005) use inoperability input-output modeling (IIM) to quantify economic losses and their propagation through the various economic sectors for large-scale civil infrastructures controlled by SCADA systems over internet protocol communication networks. The work by Nozick, Turnquist, Jones, Davis, and Lawton (2005) focuses on representing interdependent infrastructure networks using Markov and semi-Markov processes to reflect uncertain capacity on network links.…”
Section: Risk Assessment Of Critical Systemsmentioning
confidence: 99%