2022
DOI: 10.1016/j.ress.2021.108270
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid ontology for safety, security, and dependability risk assessments and Security Threat Analysis (STA) method for industrial control systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 34 publications
(14 citation statements)
references
References 33 publications
0
11
0
Order By: Relevance
“…A malfunction threat or attack may cause substantive damages with economic and even life losses in the real world [4]. PLC is the main target in almost all security events against the ICS [17], relating to most potential attacks and threats [18]. Although different PLC manufacturers have significant differences, such as protocols, programming languages, and firmware [19], the firmware tampering attack is a general attack method.…”
Section: Preliminaries: Plc Structure and Securitymentioning
confidence: 99%
“…A malfunction threat or attack may cause substantive damages with economic and even life losses in the real world [4]. PLC is the main target in almost all security events against the ICS [17], relating to most potential attacks and threats [18]. Although different PLC manufacturers have significant differences, such as protocols, programming languages, and firmware [19], the firmware tampering attack is a general attack method.…”
Section: Preliminaries: Plc Structure and Securitymentioning
confidence: 99%
“…Alanen et al, 2022 [11] developed a Hybrid Reliability, Availability, Maintainability, Safety, and Security (HRAMSS) risk assessment management ontology and an associated Security Threat Analysis Methodlogy (STAM) with an ICS use case. To develop the ontology, a comparison of security risk assessment in ICS and OT was investigated.…”
Section: Related Workmentioning
confidence: 99%
“…The Imperfection contains Fault and Vulnerability concepts; Hazard, Loss scenario and Threat concepts are classified into HRAMSS hazard category; Risk control category is further sub-categorized into ProtectiveMeasure, ImprovementMeasure, and CounterMeasure concepts; the Negative impact category is unbundled with Harm, Loss, and Impact concepts. The HRAMSS ontology can be extended for cybersecurity risk assessment in IIoT environments, as it provides sufficient metadata and related classes [11]. The HRAMSS ontology contains similar concepts and properties to other ontologies.…”
Section: Related Workmentioning
confidence: 99%
“…This thesis allows us to mention several methodologies related to our object of investigation. These are the following methodologies 15 19 : the integration of information; the security analysis; the analysis of security policies; the decisions support in the field of protection; the automated control of the protection subsystem (including the based of Security Content Automation Protocol ones); the correlation analysis of events; the definition of security metrics. …”
Section: Introductionmentioning
confidence: 99%
“…Interestingly, apologists for expert methods of functional safety assessment 20 , 21 focus their efforts on developing methodologies to support decision-making and metrics in the field of investigation and summarize the results in the form of profile standards, such as ISO/IEC 61508, for example. Apologists of the methodology of automated control of the protection subsystem 15 17 , 19 , 22 – 24 define the core of such systems in the mathematical apparatus of probability theory and mathematical statistics, graph theory, and Petri nets, fuzzy logic, Markov chains, artificial intelligence and more. At the same time, the results obtained in this direction are of research interest because applying the obtained models and methods requires large amounts of empirical data and computing power.…”
Section: Introductionmentioning
confidence: 99%