2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th Intl Conf on Pervasive Intelligence and Computing, 2018
DOI: 10.1109/dasc/picom/datacom/cyberscitec.2018.00025
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Quantitative Risk Assessment Methods in Security Design for Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 6 publications
0
7
0
Order By: Relevance
“…RSS-CWSS_CPS is a risk quantification method based on CWSS which is defined in the ITU-T X.1525 standard [25]. Kawanishi et al first applied CWSS to a data logger in an industrial control system as a TOE and confirmed that small equipment could be evaluated properly [16]. RSS-CWSS_CPS is a redefinition of the method in [16], and uses 8 of 16 metrics of CWSS.…”
Section: Risk Evaluation Methods Rss-cwss_cpsmentioning
confidence: 99%
See 2 more Smart Citations
“…RSS-CWSS_CPS is a risk quantification method based on CWSS which is defined in the ITU-T X.1525 standard [25]. Kawanishi et al first applied CWSS to a data logger in an industrial control system as a TOE and confirmed that small equipment could be evaluated properly [16]. RSS-CWSS_CPS is a redefinition of the method in [16], and uses 8 of 16 metrics of CWSS.…”
Section: Risk Evaluation Methods Rss-cwss_cpsmentioning
confidence: 99%
“…Kawanishi et al first applied CWSS to a data logger in an industrial control system as a TOE and confirmed that small equipment could be evaluated properly [16]. RSS-CWSS_CPS is a redefinition of the method in [16], and uses 8 of 16 metrics of CWSS. The risk score for a threat is calculated by the following equation (2) using CWSS [25].…”
Section: Risk Evaluation Methods Rss-cwss_cpsmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper is organized as follows: Section 2 discusses related research about the cyber security [7][8][9][10], automation [11][12][13], and asset management [14][15][16][17] for IIoT and OT systems. Section 3 proposes the modeling method and data structure for IIoT systems, and Section 4 designs the asset configuration management method.…”
Section: (C) High Reliability and High Availabilitymentioning
confidence: 99%
“…Other studies on asset management include the proposal of an asset container method using the CWSS (Common Weakness Scoring System) and CVSS (Common Vulnerability Scoring System) [15], a study relating to a control system asset management tool that takes security into consideration [16], and an interface for the standardized management of control system assets (AAS: Asset Administration Shell) [17].…”
Section: Related Researchmentioning
confidence: 99%