2018
DOI: 10.2139/ssrn.3370560
|View full text |Cite
|
Sign up to set email alerts
|

Cybersafety Analysis of a Central Utilities Plant (CUP) Gas Turbine using STPA-SEC

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…The STPA-based security analysis approach (STPA-Sec) has been used to identify system security constraints in various industries. Khan, Madnick & Moulton (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…The STPA-based security analysis approach (STPA-Sec) has been used to identify system security constraints in various industries. Khan, Madnick & Moulton (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…The STPA-based security analysis approach (STPA-Sec) has been used to identify system security constraints in various industries. Khan et al (2018) demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a central utilities plant gas turbine use case in industrial control systems. Mailloux et al (2019) used the STPA-Sec to elicit systems security requirements for a notional autonomous space system.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%
“…The STPA-Sec approach or its extensions have been used to identify system security constraints in various industries. Khan, Madnick and Moulton [22] demonstrated the implementation of STPA-Sec to identify security vulnerabilities of a use case (Central Utilities Plant Gas Turbine) in industrial control systems. Carter [23] used STPA-Sec with a previous information elicitation process to analyze a small reconnaissance unmanned aerial vehicles.…”
Section: Stpa-sec Applications and Gapsmentioning
confidence: 99%