2006
DOI: 10.2172/911553
|View full text |Cite
|
Sign up to set email alerts
|

Control Systems Cyber Security:Defense in Depth Strategies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
41
0

Year Published

2008
2008
2022
2022

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 59 publications
(41 citation statements)
references
References 0 publications
0
41
0
Order By: Relevance
“…The case study uses a typical threezone ICS architecture extracted from Kuipers and Fabro (2006); Stouffer et al (2011). As given in Figure 3 Figure 3(c), derived from BSI (2014) and Kuipers and Fabro (2006).…”
Section: Case Studymentioning
confidence: 99%
See 2 more Smart Citations
“…The case study uses a typical threezone ICS architecture extracted from Kuipers and Fabro (2006); Stouffer et al (2011). As given in Figure 3 Figure 3(c), derived from BSI (2014) and Kuipers and Fabro (2006).…”
Section: Case Studymentioning
confidence: 99%
“…To mitigate the increasing cyber threats targeting ICS, many government advisory reports and industrial standards propose Defense-in-Depth as the best practice to defend ICS (Stouffer et al 2011;Kuipers and Fabro 2006). Defense-in-depth aims to protect a system by establishing a multi-layer defense by combining various defensive controls, such as advanced firewalls with DMZ, security awareness training programs, a vulnerability management system, intrusion detection with effective access policies, and incident response mechanisms.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to their different construction goals, industrial control systems and traditional IT systems still have considerable differences in terms of technology, management and service [6]. Some typical differences are shown in the Table 1.…”
Section: Difference Between Traditional It System and Icsmentioning
confidence: 99%
“…This probable defeat can trigger a chain reaction that will include but not limited to the obliteration of financial systems, loss of trust from investors and onward economic misfortunes such as recession, stagnation and strangulation of economic policies, national technology system failures and crashes, data leaks, and loss of profits. However, enforcing a national readiness strategy through defence-in-depth may likely serve as a panacea for controlled access and isolation of the impact zone in the event of a zero-day [31], [32]. This helps to ensure that the failure of a single control does not result to total system compromise.…”
Section: Cyber-warfare and National Readinessmentioning
confidence: 99%