2013
DOI: 10.6028/nist.sp.800-82r1
|View full text |Cite
|
Sign up to set email alerts
|

Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
22
0
2

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 21 publications
(24 citation statements)
references
References 11 publications
0
22
0
2
Order By: Relevance
“…The source of a threat is the initiator of an attack. Threat sources fall into three types: adversarial threats which pose malicious intentions from individuals, groups organizations or states/nations; accidental threats are threats that have been caused accidentally or through legitimate CPS components; environmental threats which include natural disasters (floods, earthquakes), human-caused disasters (fires, explosions), and failures of supporting infrastructure (power outage or telecommunications loss) [16], [74], [119], [132], [146], [147], [155].…”
Section: A General Cps Threat Modelmentioning
confidence: 99%
See 3 more Smart Citations
“…The source of a threat is the initiator of an attack. Threat sources fall into three types: adversarial threats which pose malicious intentions from individuals, groups organizations or states/nations; accidental threats are threats that have been caused accidentally or through legitimate CPS components; environmental threats which include natural disasters (floods, earthquakes), human-caused disasters (fires, explosions), and failures of supporting infrastructure (power outage or telecommunications loss) [16], [74], [119], [132], [146], [147], [155].…”
Section: A General Cps Threat Modelmentioning
confidence: 99%
“…Following ICS security standards like theirs, among others, should significantly contribute to securing ICS. For example, Stouffer et al [147] provided a comprehensive guidelines for ICS security. They provide guidelines for technical controls such as firewalls, IDS, and access control, and operational controls such as personnel security, awareness, and training.…”
Section: Ics Controlsmentioning
confidence: 99%
See 2 more Smart Citations
“…NIST has developed security guidelines, especially NISTIR 7628 and NIST SP 800-82 for AMI and SCADA security [9,15,27]. NERC also provides cyber security requirements for bulk electric power systems [16,17].…”
Section: Security Analytics For Ami and Scadamentioning
confidence: 99%