2020
DOI: 10.2139/ssrn.3544333
|View full text |Cite
|
Sign up to set email alerts
|

Cybersafety Analysis of Industrial Control Systems: Chiller Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 2 publications
0
1
0
Order By: Relevance
“…For instance, a cyberattack that disabled the electricity grid would disrupt communication networks, which would in turn impede emergency response, and so forth. In addition, in certain sectors-such as dams, pipelines, oil refineries, aviation, or nuclear reactors-successful cyberattacks on control and safety systems could potentially cause property damage and loss of life (Greenberg 2019;Angle, Madnick, and Kirtley Jr. 2019;Khan, Madnick, and Moulton 2018;Nourian and Madnick 2018;MacKinnan et al 2013, Clayton andSegal 2013;Lee, Assante, and Conway 2016;Bronk and Tikk-Ringas 2013). Some critical infrastructure sectors are nearconstant targets of probes and intrusions, whether by isolated individuals, hacker collectives, criminal organizations, or hostile nation-states (Johnson 2015;Lewis 2018).…”
Section: Evidence For Practicementioning
confidence: 99%
“…For instance, a cyberattack that disabled the electricity grid would disrupt communication networks, which would in turn impede emergency response, and so forth. In addition, in certain sectors-such as dams, pipelines, oil refineries, aviation, or nuclear reactors-successful cyberattacks on control and safety systems could potentially cause property damage and loss of life (Greenberg 2019;Angle, Madnick, and Kirtley Jr. 2019;Khan, Madnick, and Moulton 2018;Nourian and Madnick 2018;MacKinnan et al 2013, Clayton andSegal 2013;Lee, Assante, and Conway 2016;Bronk and Tikk-Ringas 2013). Some critical infrastructure sectors are nearconstant targets of probes and intrusions, whether by isolated individuals, hacker collectives, criminal organizations, or hostile nation-states (Johnson 2015;Lewis 2018).…”
Section: Evidence For Practicementioning
confidence: 99%