2018 International Russian Automation Conference (RusAutoCon) 2018
DOI: 10.1109/rusautocon.2018.8501811
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Security Risk Assessment Method for SCADA of Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…Examples include ADAMANT [26], an information security management system compliant with ISO standards; LISRA [27], a risk assessment framework simplifying the construction of attack scenarios in specific domains; and CSCCRA [28], a risk assessment methodology designed for evaluating risks in dynamic cloud environments with multiple service providers. Some research contributions, like [29], have even suggested integrating the safety of cyber-physical devices into existing risk management frameworks based on ISO standards. Others, such as [30], have proposed layered cyber risk management frameworks tailored to the unique challenges of the Internet of Things.…”
Section: Cyber Risk Managementmentioning
confidence: 99%
“…Examples include ADAMANT [26], an information security management system compliant with ISO standards; LISRA [27], a risk assessment framework simplifying the construction of attack scenarios in specific domains; and CSCCRA [28], a risk assessment methodology designed for evaluating risks in dynamic cloud environments with multiple service providers. Some research contributions, like [29], have even suggested integrating the safety of cyber-physical devices into existing risk management frameworks based on ISO standards. Others, such as [30], have proposed layered cyber risk management frameworks tailored to the unique challenges of the Internet of Things.…”
Section: Cyber Risk Managementmentioning
confidence: 99%
“…The security gaps assessment provides organizations with a baseline along with strategic roadmap of short-term and long-term milestones. It also provides a plan of action to reach the security maturity level by implementation of security goals (Poletykin, 2018). The security gap analysis process comprises of determining, documenting and obtaining executive management recognition of the discrepancy between the requirements baselined in the regulation standard or the standard against which the assessment is carried out and the organizations current security maturity level.…”
Section: Security Gaps Assessmentmentioning
confidence: 99%
“…In addition to these studies, Alexey et al (2018) proposed a cyber security formula-based risk evaluation method for critical national infrastructure (CNI) plants, where they considered not only information protection but also all available safety, security, and reliability controls. They employed cyber threat sources (I), barriers (B), and vulnerabilities (Vt) in the formula, which had the ability to compare the maximum and current levels specified in the cyber security policy [27].…”
Section: Introductionmentioning
confidence: 99%