Blog
About

289
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Measuring the Risk of Cyber Attack in Industrial Control Systems

      , , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      ICS, SCADA, Risk, HILF, Cyber, Security, Process Control, Deep Uncertainty

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Cyber attacks on industrial control systems (ICS) that underpin critical national infrastructure can be characterised as high-impact, low-frequency events. To date, the volume of attacks versus the overall global footprint of ICS is low, and as a result there is an insufficient dataset to adequately assess the risk to an ICS operator, yet the impacts are potentially catastrophic. This paper identifies key elements of existing decision science that can be used to inform and improve the cyber security of ICS against antagonistic threats and highlights the areas where further development is required to derive realistic risk assessments, as well as detailing how data from established safety processes may inform the decision-making process. The paper concludes by making recommendations as to how a validated dataset could be constructed to support investment in ICS cyber security.

          Related collections

          Most cited references 26

          • Record: found
          • Abstract: not found
          • Article: not found

          State of the Art—Encoding Subjective Probabilities: A Psychological and Psychometric Review

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            A Survey of Game Theory as Applied to Network Security

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Knowledge Maps

                Bookmark

                Author and article information

                Contributors
                URI : www.dmu.ac.uk
                URI : www.dmu.ac.uk
                URI : www.dmu.ac.uk
                URI : www.dmu.ac.uk
                Conference
                August 2016
                August 2016
                : 103-113
                Affiliations
                Cyber Security Centre, De Montfort University, Leicester, LE1 9BH, UK
                Article
                10.14236/ewic/ICS2016.12
                © Cook et al. Published by BCS Learning & Development Ltd. Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                4th International Symposium for ICS & SCADA Cyber Security Research 2016
                ICS-CSR
                4
                Queen’s Belfast University, UK
                23 - 25 August 2016
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article