369
views
0
recommends
+1 Recommend
1 collections
    4
    shares
       
      • Record: found
      • Abstract: found
      • Conference Proceedings: found
      Is Open Access

      Towards Agile Industrial Control Systems Incident Response

      proceedings-article

      ,

      3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015) (ICS-CSR)

      Industrial Control System & SCADA Cyber Security Research (ICS-CSR)

      17 - 18 September 2015

      security incident, industrial control systems, agile, incident response

      Bookmark

            Abstract

            The integration of Industrial Control Systems (ICS) with IT systems has increased the ICS’ exposure to cyber threats.We have seen a tremendous increase in the number of security incidents happened to ICS in the past five years. This requires the ICS to provide effective incident response capabilities to counteract security attacks. Previous research on ICS incident response has been focusing on incident detection and analysis. This paper examines the current ICS incident response procedure from a managerial perspective, identifies the unique characteristics of ICS incident response and proposes a framework to improve incident response capabilities. In particular, it evaluates the benefit of agile values to address specific characteristics of ICS Incident Response. This foundational work sets the scene for future research to apply agile practices into ICS Incident Response.

            Content

            Author and article information

            Contributors
            Conference
            September 2015
            September 2015
            : 95-98
            Affiliations
            [0001]Cyber Security Centre

            De Montfort University

            The Gateway House

            Leicester, UK
            [0002]Software Technology Research Laboratory

            De Montfort University

            The Gateway House

            Leicester, UK
            Article
            10.14236/ewic/ICS2015.11
            ef86d492-4e93-408b-80a5-059b794558eb
            © He et al. Published by BCS Learning & Development Ltd. Proceedings of the 3 rd International Symposium for ICS & SCADA Cyber Security Research 2015

            This work is licensed under a Creative Commons Attribution 4.0 Unported License. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/

            3rd International Symposium for ICS & SCADA Cyber Security Research 2015 (ICS-CSR 2015)
            ICS-CSR
            3
            Germany
            17 - 18 September 2015
            Electronic Workshops in Computing (eWiC)
            Industrial Control System & SCADA Cyber Security Research (ICS-CSR)
            Product
            Product Information: 1477-9358BCS Learning & Development
            Self URI (journal page): https://ewic.bcs.org/
            Categories
            Electronic Workshops in Computing

            References

            1. Homeland Security 2009 Recommended Practice: Developing an Industrial Control Systems Cyber-security Incident Response Capability

            2. 2011 Guide to industrial control systems (ICS) security NIST special publication 800 82

            3. 2009 Agilla: A mobile agent middleware for self-adaptive wireless sensor networks ACM Trans. Auton. Adaptive Syst. (TAAS) 4 3 16

            4. 2014 Diagramming approach to structure the security lessons: Evaluation using cognitive dimensions Trust and Trustworthy Computing Springer International Publishing 216 217

            5. 2014 Mar An empirical study on the use of the generic security template for structuring the lessons from information security incidents 6th IEEE International Conference on Computer Science and Information Technology 178 188

            6. 2014 May Improving the information security management: An industrial study in the privacy of electronic patient records IEEE 27th International Symposium on Computer-Based Medical Systems (CBMS) 525 526

            7. 2012 Generic security cases for information system security in healthcare systems Proceedings of the 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference Edinburgh, U.K

            8. 2010 Organisational learning and incident response: Promoting effective learning through the incident response process School of Computer and Information Science Perth, Western Australia Edith Cowan University

            9. 2012 SCADA security in the light of Cyber-Warfare Comput. Secur 31 4 418 436

            10. 2001 Manifesto for agile software development Available from http://agilemanifesto.org/

            11. European Commission 2015 Digital Security: Cybersecurity, privacy and trust - the role of ICT in critical infrastructure protection Available from http://ec.europa.eu/research/participants/portal/ desktop/en/opportunities/h2020/topics/1052-ds-03-2015.html

            12. U. D. of Homeland Security 2010 ICS-CERT year in review 2010 Washington, D.C Available from https://icscert.us-cert.gov/ICS-CERT-Year-Review-2010

            13. U. D. of Homeland Security 2014 ICS-CERT year in review 2014 Washington, D.C Available from https://ics-cert.us-cert.gov/NCCICICSCERTreleases-Year-Review-2014

            14. 2010 Preparation, detection, and analysis: The diagnostic work of IT security incident response Inform. Manage. Comput. Secur 18 1 26 42 Emerald Group Publishing Limited

            15. 2005 Case study: Network intrusion investigation lessons in forensic preparation Digital Investigation 2 4 254 260 Elsevier

            16. 2012 Security aspects of SCADA and DCS environments Critical Infrastructure Protection Berlin, Heidelberg, Germany Springer 120 149

            17. 2014 Rethinking security incident response: The integration of agile principles arXiv preprint arXiv:1408.2431

            18. 2013 Can We Learn from SCADA Security Incidents White Paper European Union Agency for Network and Information Security Heraklion, Crete, Greece

            19. 2012 Incident response teams challenges in supporting the organisational security function Comput. Secur 31 5 643 652 Elsevier

            Comments

            Comment on this article