2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T) 2020
DOI: 10.1109/picst51311.2020.9467957
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Risk Assessment of Information Systems of Critical Infrastructure Objects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…They identify a broad set of attack vectors and attack scenarios that threaten the security of power networks for which they propose to employ a defensively in-depth strategy that includes measures for device and application security, network security, physical security, and ultimately policies, procedures, and information sharing. The common basis for these analyses is the implementation of risk analysis as indicated by V. Mokhor from Pukhov Institute for Modelling in Energy Engineering [ 11 , 12 ], respectively, in the article “Intelligent System for Risk Identification of Cybersecurity Violations in Energy Facility”. Both articles are connected by the detailed concept of complex cyber security risks of information systems of critical infrastructure objects, in the form of a vector risk model, including similarly developed options for calculating the overall risk, based on the structural decision of an autonomous computer system for calculating the cyber security risk of such systems Using the published approaches, it is then possible to assess the risks as a whole, including the consideration of the human subjective factor in risk assessment, which is extremely important for critical infrastructure, especially in the energy sector.…”
Section: Cyber Security In Substation Automation Systemsmentioning
confidence: 99%
“…They identify a broad set of attack vectors and attack scenarios that threaten the security of power networks for which they propose to employ a defensively in-depth strategy that includes measures for device and application security, network security, physical security, and ultimately policies, procedures, and information sharing. The common basis for these analyses is the implementation of risk analysis as indicated by V. Mokhor from Pukhov Institute for Modelling in Energy Engineering [ 11 , 12 ], respectively, in the article “Intelligent System for Risk Identification of Cybersecurity Violations in Energy Facility”. Both articles are connected by the detailed concept of complex cyber security risks of information systems of critical infrastructure objects, in the form of a vector risk model, including similarly developed options for calculating the overall risk, based on the structural decision of an autonomous computer system for calculating the cyber security risk of such systems Using the published approaches, it is then possible to assess the risks as a whole, including the consideration of the human subjective factor in risk assessment, which is extremely important for critical infrastructure, especially in the energy sector.…”
Section: Cyber Security In Substation Automation Systemsmentioning
confidence: 99%
“…Artificial neural networks used to assess and predict of information security risks during the audit not only allows you to effectively select countermeasures to protect OBI IS, but in general to build an effective ISMS adaptable to new threats. The cost reduction was at least 15% in comparison with the methods of risk assessment in the course of information security audit, which are described in the works [29,[32][33][34].…”
Section: Computational Experimentsmentioning
confidence: 99%
“…In the conditions of the growing energy crisis on the European continent, caused by global geopolitical processes, which concern the international security system in general and the defense capability of individual countries in particular, the issue of ensuring the stable and safe functioning of critical infrastructure objects becomes especially relevant [1][2][3][4]. The basis of the management of technological processes (TP) of production activity is the Industrial Control Systems (ICS).…”
mentioning
confidence: 99%