2017
DOI: 10.1111/risa.12681
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk

Abstract: Industrial control systems increasingly use standard communication protocols and are increasingly connected to public networks-creating substantial cybersecurity risks, especially when used in critical infrastructures such as electricity and water distribution systems. Methods of assessing risk in such systems have recognized for some time the way in which the strategies of potential adversaries and risk managers interact in defining the risk to which such systems are exposed. But it is also important to consi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
7
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 80 publications
1
7
0
Order By: Relevance
“…Where we see "understanding the system" to be a key phase within the overall assessment process, it also presents a challenge to assessors. This is a salient point to which we experienced a similar reaction during some of our previous work [3,15]. Also, we see from the broader literature that this phase receives little attention from within the academic community [6].…”
Section: Discussionsupporting
confidence: 59%
See 1 more Smart Citation
“…Where we see "understanding the system" to be a key phase within the overall assessment process, it also presents a challenge to assessors. This is a salient point to which we experienced a similar reaction during some of our previous work [3,15]. Also, we see from the broader literature that this phase receives little attention from within the academic community [6].…”
Section: Discussionsupporting
confidence: 59%
“…While there are a number of established approaches to the assessment of risk, particularly within the standards community [2], it can be seen that their application to ICSs poses a challenge. Therefore, the development of tailored ICS specific approaches have been witnessed across both academic [3] and industry contexts [17]. Our previous work summarised a handful of approaches within existing industry standards and guidelines (S&G) [13], with the work of [20] and [6] providing more comprehensive discussions.…”
Section: Introductionmentioning
confidence: 99%
“…At the extreme end of the spatial considerations, non-geographically bound systems (such as the internet) require minimal logistical capabilities, yet may require HRSC intervention due to the interconnectivity of critical infrastructure with the internet (Umberger and Gheorghe, 2011). Cyber-attacks can cripple infrastructure across non-geographically bound space (Paté-Cornell et al, 2017), particularly when such systems are connected to public assets (Busby et al, 2017). As such, HRSCs tasked with delivering aid to spatially dispersed communities will have vastly different design considerations to their counterparts servicing settings with higher population concentrations.…”
Section: Spatial Considerationsmentioning
confidence: 99%
“…In the context of military combat modeling, the effects of military deceit and of gaining insights into aggregating longer chains of military events were modeled (Roponen & Salo, ). Recently, Busby, Green, and Hutchison () analyzed the effects of cyber attacks on industrial control systems.…”
Section: Introductionmentioning
confidence: 99%