2014
DOI: 10.1007/978-3-642-55415-5_37
|View full text |Cite
|
Sign up to set email alerts
|

A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model

Abstract: Part 10: Organizational SecurityInternational audienceIndustrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importance such as energy production and distribution, transportation, telecoms etc. Protection of such systems is the cornerstone of essential service provision with resilience and in timely manner. Effective risk management methods form the basis for the protection of an Industrial… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…Several works in the literature have proposed a holistic approach for enhancing CIP [11,12,27]. The authors in [27] evaluate the risk assessment phase of critical infrastructure and propose an enhancement to the traditional risk management methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Several works in the literature have proposed a holistic approach for enhancing CIP [11,12,27]. The authors in [27] evaluate the risk assessment phase of critical infrastructure and propose an enhancement to the traditional risk management methods.…”
Section: Introductionmentioning
confidence: 99%
“…Several works in the literature have proposed a holistic approach for enhancing CIP [11,12,27]. The authors in [27] evaluate the risk assessment phase of critical infrastructure and propose an enhancement to the traditional risk management methods. They employ the cybernetic construct of the viable system model towards a holistic view of the risks against critical infrastructure.…”
Section: Introductionmentioning
confidence: 99%
“…According to Spyridopoulos et al (2014), when principles from the Viable System Model, which is grounded in Systems Theory are combined with an IT Risk Analysis, more security threats and vulnerabilities can be identified. Furthermore, this shows that theoretical research findings can provide security managers with insights which they might otherwise not consider.…”
Section: Information Security Policy Compliance and Security Behaviour: Backgroundmentioning
confidence: 99%