2019
DOI: 10.1109/mias.2018.2875175
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity for Protection and Control Systems: An Overview of Proven Design Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(13 citation statements)
references
References 6 publications
0
11
0
Order By: Relevance
“…According to the NIST (National Institute of Standards and Technology) Risk Management Guide for Information Technology Systems "Risk is a function of the likelihood of a given threat-source's exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization". (2) The Risk Assessment Methodology can be described in 9 steps and in the following section we'll be examining how the three vulnerability scanners we are comparing (Nessus, OpenVAS and NSE) can be used to gather and present information in regards to each of these steps.…”
Section: Performing a Risk Assessmentmentioning
confidence: 99%
See 4 more Smart Citations
“…According to the NIST (National Institute of Standards and Technology) Risk Management Guide for Information Technology Systems "Risk is a function of the likelihood of a given threat-source's exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization". (2) The Risk Assessment Methodology can be described in 9 steps and in the following section we'll be examining how the three vulnerability scanners we are comparing (Nessus, OpenVAS and NSE) can be used to gather and present information in regards to each of these steps.…”
Section: Performing a Risk Assessmentmentioning
confidence: 99%
“…Threat Identification Threat is described as the potential for a particular threat-source to successfully exploit a vulnerability in a way that can harm the system. (2) Even though sources and motivation for their threat actions cannot be identified by a vulnerability scanner and should be investigated specifically for each organization and its data by the management and the IT professionals, knowing what vulnerabilities exist and where in the system can provide with an indication of who could potentially seek to exploit them and what would be their motivation.…”
Section: Performing a Risk Assessmentmentioning
confidence: 99%
See 3 more Smart Citations