2008
DOI: 10.1007/978-3-540-89173-4_21
|View full text |Cite
|
Sign up to set email alerts
|

Ideal Based Cyber Security Technical Metrics for Control Systems

Abstract: Abstract. Much of the world's critical infrastructure is at risk from attack through electronic networks connected to control systems. Security metrics are important because they provide the basis for management decisions that affect the protection of the infrastructure. A cyber security technical metric is the security relevant output from an explicit mathematical model that makes use of objective measurements of a technical object. A specific set of technical security metrics are proposed for use by the oper… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
5

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 39 publications
(42 citation statements)
references
References 8 publications
0
37
0
5
Order By: Relevance
“…This is clearly a simplistic approach, and is unlikely to give the strongest indicator of the vulnerability of the network. This is similar to other work which has been performed on assessing overall vulnerability by the presence of low-level vulnerabilities [6] [25][27] [40]. One potentially viable way to do this would be to combine it with control lists that have different levels of controls, e.g.…”
Section: Discussionmentioning
confidence: 59%
See 2 more Smart Citations
“…This is clearly a simplistic approach, and is unlikely to give the strongest indicator of the vulnerability of the network. This is similar to other work which has been performed on assessing overall vulnerability by the presence of low-level vulnerabilities [6] [25][27] [40]. One potentially viable way to do this would be to combine it with control lists that have different levels of controls, e.g.…”
Section: Discussionmentioning
confidence: 59%
“…Our approach to vulnerability assessment is based on the thesis that all infrastructures are vulnerable, and that this vulnerability can only be mitigated 6 with the implementation of certain controls. This is similar to higher-level risk assessment methodologies (e.g.…”
Section: A Controls-based Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…Since the TA architecture considers issues across each OTI viewpoint, the inclusion or adaptation of any method that could support them was vital. While existing methods [23][24][25][26][27] provide interesting insight into the assessment of security, it appears some may face challenges when considering multiple OTI viewpoints. Through basic adaptation, the method in [28] appears to provide a good starting point.…”
Section: Case Studymentioning
confidence: 99%
“…The ideal-based metrics are agreements on the attributes of an ideal cybersecurity system and then assessing how closely the considered system approaches the ideal. 64 Using the known approaches in Sect. 3, MITIGATING STRATEGIES, and ideal-based metrics, one can make a positive statement-of-measure for cybersecurity protection.…”
Section: Ideal-based Metricmentioning
confidence: 99%