2015
DOI: 10.1016/j.ijcip.2015.02.002
|View full text |Cite
|
Sign up to set email alerts
|

A survey of cyber security management in industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
128
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 255 publications
(128 citation statements)
references
References 104 publications
0
128
0
Order By: Relevance
“…A brief introduction to traditional risk modelling techniques is available in [11], and several reviews of risk assessment in critical complex system exist [13][14][15][16]. In summary the most popular approaches, include Fault Tree Analysis [4], Attack Trees [6], Cause-consequence/effect diagrams [7], Bayesian networks [8,9] and CORAS diagrams [12].…”
Section: Comparison To Other Modelling Approachesmentioning
confidence: 99%
“…A brief introduction to traditional risk modelling techniques is available in [11], and several reviews of risk assessment in critical complex system exist [13][14][15][16]. In summary the most popular approaches, include Fault Tree Analysis [4], Attack Trees [6], Cause-consequence/effect diagrams [7], Bayesian networks [8,9] and CORAS diagrams [12].…”
Section: Comparison To Other Modelling Approachesmentioning
confidence: 99%
“…[41]). An example specific for the chemical industry is the Chemical Sector Coordinating Council, which works in partnership with the Department of Homeland Security and has established a national control systems security programme to specifically address the cybersecurity issues within PCS systems in critical infrastructures ( [4], p.22; [8]). Last, the Chemical Facility Anti-Terrorism Standards (CFATS) requires chemical facilities designated by DHS to comply with Risk-Based Performance Standards, including the standard that regulated facilities must deter cyber sabotage, including preveting remote access to critical PCS and ICS systems (DHS [14,15]).…”
Section: Strengthening the Role Of Government?mentioning
confidence: 99%
“…Three public supervising agencies monitor the risk of a chemical accident in the Rijnmond area: the Occupational Safety and Health Agency, a national inspectorate entrusted with occupational health and safety; the regional 'Safety Region Board', which includes the specialized regional Fire Brigade for ex post crisis management, and DCMR, the regional environmental protection agency mandated for licensing and inspecting major hazard facilities. 8 Together, these three agencies monitor compliance to the European Seveso regulation for industrial safety, implemented in the Netherlands in the Major Accidents Hazards Decree, and in the environmental license. Although each of these agencies carries out frequent inspections of chemical facilities in the Rijnmond area, none of them currently includes cybersecurity in their inspections; nor is it part of the licensing requirements.…”
Section: Strengthening the Role Of Government?mentioning
confidence: 99%
“…Given the near-ubiquitous use of information systems by both enterprise and individuals, a breach of NIS can result in severe consequences beyond the purely economic, with potential repercussions for other forms of critical infrastructure, such as loss of energy supplies or failure of transport networks (2006, p. 5). Indeed, as Knowles et al indicate, corporate networks and the Internet increasingly form part of industrial control systems, presenting potential risks to physical industrial systems through the misuse or attack of computer systems [48]. However, and of direct relevance to this paper, the 2006 Commission Communication proposes a strategy for ensuring NIS that goes beyond the initial discussions in the 2001 Communication and the previously limited role of the private sector under the 2004 ENISA Regulation, through direct interaction and engagement with private stakeholders, based on Bdialogue, partnership and empowerment^(2006, p. 6).…”
Section: Conceptualising the Role Of Private Actors In Network And Inmentioning
confidence: 99%