2023
DOI: 10.1109/access.2023.3263671
|View full text |Cite
|
Sign up to set email alerts
|

Extended Dependency Modeling Technique for Cyber Risk Identification in ICS

Abstract: Complex systems such as Industrial Control Systems (ICS) are designed as a collection of functionally dependent and highly connected units with multiple stakeholders. Identifying the risk of such complex systems requires an overall view of the entire system. Dependency modelling (DM) is a highly participative methodology that identifies the goals and objectives of a system and the required dependants to satisfy these goals. Researchers have proved DM to be suitable for identifying and quantifying impact and un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 32 publications
(57 reference statements)
0
1
0
Order By: Relevance
“…While IT security primarily focuses on safeguarding digital assets such as data and cloud services, smart manufacturing security extends its scope to protect operational technology (OT) systems, such as industrial control systems and physical machinery [6]. The convergence of IT and OT systems presents significant complexities in asset management and dependence analysis, posing significant challenges to vulnerability mitigation [7,8]. A primary concern in IT security is the identification and prioritization of vulnerable assets, which is complicated by the sheer volume of components and their intricate interconnections.…”
Section: Introductionmentioning
confidence: 99%
“…While IT security primarily focuses on safeguarding digital assets such as data and cloud services, smart manufacturing security extends its scope to protect operational technology (OT) systems, such as industrial control systems and physical machinery [6]. The convergence of IT and OT systems presents significant complexities in asset management and dependence analysis, posing significant challenges to vulnerability mitigation [7,8]. A primary concern in IT security is the identification and prioritization of vulnerable assets, which is complicated by the sheer volume of components and their intricate interconnections.…”
Section: Introductionmentioning
confidence: 99%