Blog
About

219
views
0
recommends
+1 Recommend
1 collections
    4
    shares
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Ontology and life cycle of knowledge for ICS security assessments

      , ,

      4th International Symposium for ICS & SCADA Cyber Security Research 2016 (ICS-CSR)

      Cyber Security Research

      23 - 25 August 2016

      ICS Security, Security Ontology, Security Knowledge, Knowledge Life Cycle.

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Industrial Control Systems (ICS) succumb to an ever evolving variety of threats. Additionally, threats are increasing in number and get more complex. This requires a holistic and up-to-date security concept for ICS as a whole. Usually security concepts are applied and updated based on regularly performed ICS security assessments. Such ICS security assessments require high effort and extensive knowledge about ICS and its security. This is often a problem for small and mediumsized enterprises (SME), which do not have sufficient respective sufficiently skilled human resources. This paper defines in a first step requirements on the knowledge needed to perform an ICS security assessment and the life cycle of this knowledge. Afterwards the ICS security knowledge and its life cycle are developed and discussed considering the requirements and related work.

          Related collections

          Most cited references 38

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Formalizing information security knowledge

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            An Ontology of Information Security

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              The information systems' security level assessment model based on an ontology and evidential reasoning approach

                Bookmark

                Author and article information

                Contributors
                Conference
                October 2016
                October 2016
                : 32-41
                Affiliations
                Faculty I – Electrical Engineering and Information Technology, University of Applied Sciences and Arts Hannover, Ricklinger Stadtweg 120, 30459 Hannover, Germany
                Institute of Automation Technology, Helmut Schmidt University / University of the Federal Armed Forces, Holstenhofweg 85, 22043 Hamburg, Germany
                Article
                10.14236/ewic/ICS2016.5
                © Tebbe et al. Published byBCS Learning & Development Ltd.Proceedings of the 4th International Symposium for ICS & SCADA Cyber Security Research 2016

                This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

                4th International Symposium for ICS & SCADA Cyber Security Research 2016
                ICS-CSR
                4
                Queen’s Belfast University, UK
                23 - 25 August 2016
                Electronic Workshops in Computing (eWiC)
                Cyber Security Research
                Product
                Product Information: 1477-9358BCS Learning & Development
                Self URI (journal page): https://ewic.bcs.org/
                Categories
                Electronic Workshops in Computing

                Comments

                Comment on this article