2018
DOI: 10.1016/j.cose.2017.09.004
|View full text |Cite
|
Sign up to set email alerts
|

A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis

Abstract: To cite this version:H Abdo, M. Kaouk, J-M. Flaus, F. Masse. A safety/security risk analysis approach of industrial control systems: a cyber bowtie -combining new version of attack tree with bowtie analysis. Computers Security, 2017, 72, pp.175-195 AbstractThe introduction of connected systems and digital technology in process industries creates new cyber-security vulnerabilities that can be exploited by sophisticated threats and lead to undesirable safety accidents. Thus, identifying these vulnerabilities du… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
64
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 132 publications
(79 citation statements)
references
References 19 publications
1
64
0
2
Order By: Relevance
“…In what follows we survey various methods that have been proposed in the literature towards such a threat assessment One straightforward approach for threat assessment is to use a test bed to implement different attacks [217]. Another well-known technique is so-called attack trees, where the attacker's reachable points and possibilities are exhibited on an attack graph [218], [219]. A rich introduction on attack graphs can be found in [219].…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…In what follows we survey various methods that have been proposed in the literature towards such a threat assessment One straightforward approach for threat assessment is to use a test bed to implement different attacks [217]. Another well-known technique is so-called attack trees, where the attacker's reachable points and possibilities are exhibited on an attack graph [218], [219]. A rich introduction on attack graphs can be found in [219].…”
Section: A Threat Assessmentmentioning
confidence: 99%
“…La importancia de procesos de análisis de riesgos adaptados a infraestructuras críticas siguiendo un modelo "Bow Tie" también se presenta por Abdo, H. et al en "A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtiecombining new version of attack tree with bowtie analysis" [29].…”
Section: Yongli Tang Et Al "Information Security Riskunclassified
“…In brief, an attack tree represents attacks in the form of a tree structure [15]. The root of the tree indicates the main event of potential attacks, and it then downlinks to leaf nodes which represent extended attacks (events) [16].…”
Section: Threat Modelmentioning
confidence: 99%