2016 11th System of Systems Engineering Conference (SoSE) 2016
DOI: 10.1109/sysose.2016.7542959
|View full text |Cite
|
Sign up to set email alerts
|

Impact assessment of cyber attacks: A quantification study on power generation systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…There is a good discussion in [30] on this topic, while Eling and Wirfs (2019) [31] provide some distributions calculated on experienced operational cyberlosses. Tatar et al (2020) [32] have developed a model for the Society of Actuaries that can be deployed in an insurance context to describe the specific attack vectors of an organization's systems that would potentially combined well with the model in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…There is a good discussion in [30] on this topic, while Eling and Wirfs (2019) [31] provide some distributions calculated on experienced operational cyberlosses. Tatar et al (2020) [32] have developed a model for the Society of Actuaries that can be deployed in an insurance context to describe the specific attack vectors of an organization's systems that would potentially combined well with the model in this paper.…”
Section: Discussionmentioning
confidence: 99%
“…We begin by reviewing how cyber-attacks affects critical infrastructures and their negative impact on grid operations. Power generation and distribution companies are the targets for cyberattack; usually, the attacker aims to disrupt or destroy industrial control systems [82]. Secondly, we also specifically look at the application of Information technology from the perspective of the smart grid with its security implications.…”
Section: Discussionmentioning
confidence: 99%
“…The governance aspects of CS have been investigated in businesses that are multidisciplinary by nature, and the use of various cybernetics models has been proposed in national CS risk management processes for continuous and good CS management by taking advantage of multidisciplinary cooperation, speech, target guidance, and dynamic feedback control aspects of cybernetics (Tatar et al. 2016 ; Vinnakota, 2016 ).…”
Section: Findings and Reviewmentioning
confidence: 99%
“…( 2015 ) Tatar et al. ( 2016 ) De Bruin and von Solms ( 2015 ) Lam ( 2016 ) 2 Mačák ( 2016 ) Vinnakota ( 2016 ) Machado ( 2015 ) Spremić and Šimunic ( 2018 ) 3 Güler and Arkın ( 2019 ) Rondelez ( 2018 ) Von Solms ( 2016 ) Christensen and Liebetrau ( 2019 ) 4 Aldemir and Kaya ( 2020 ) Pontbriand ( 2020 ) Carrapico and Barrinha ( 2018 ) Renaud et al. ( 2019 ) 5 Whyte ( 2018 ) Eldem ( 2020 ) 6 Thuraisingham ( 2019 ) A&CoCs analysis and control of cybersecurity, GoCs governance of cybersecurity, CsGS&M cybersecurity governance strategies and methodologies, RoCsGitF reflections of cybersecurity governance in the field …”
Section: Findings and Reviewmentioning
confidence: 99%