2018 3rd Russian-Pacific Conference on Computer Technology and Applications (RPC) 2018
DOI: 10.1109/rpc.2018.8482229
|View full text |Cite
|
Sign up to set email alerts
|

Intelligent System for Risk Identification of Cybersecurity Violations in Energy Facility

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 1 publication
0
5
0
Order By: Relevance
“…They identify a broad set of attack vectors and attack scenarios that threaten the security of power networks for which they propose to employ a defensively in-depth strategy that includes measures for device and application security, network security, physical security, and ultimately policies, procedures, and information sharing. The common basis for these analyses is the implementation of risk analysis as indicated by V. Mokhor from Pukhov Institute for Modelling in Energy Engineering [ 11 , 12 ], respectively, in the article “Intelligent System for Risk Identification of Cybersecurity Violations in Energy Facility”. Both articles are connected by the detailed concept of complex cyber security risks of information systems of critical infrastructure objects, in the form of a vector risk model, including similarly developed options for calculating the overall risk, based on the structural decision of an autonomous computer system for calculating the cyber security risk of such systems Using the published approaches, it is then possible to assess the risks as a whole, including the consideration of the human subjective factor in risk assessment, which is extremely important for critical infrastructure, especially in the energy sector.…”
Section: Cyber Security In Substation Automation Systemsmentioning
confidence: 99%
“…They identify a broad set of attack vectors and attack scenarios that threaten the security of power networks for which they propose to employ a defensively in-depth strategy that includes measures for device and application security, network security, physical security, and ultimately policies, procedures, and information sharing. The common basis for these analyses is the implementation of risk analysis as indicated by V. Mokhor from Pukhov Institute for Modelling in Energy Engineering [ 11 , 12 ], respectively, in the article “Intelligent System for Risk Identification of Cybersecurity Violations in Energy Facility”. Both articles are connected by the detailed concept of complex cyber security risks of information systems of critical infrastructure objects, in the form of a vector risk model, including similarly developed options for calculating the overall risk, based on the structural decision of an autonomous computer system for calculating the cyber security risk of such systems Using the published approaches, it is then possible to assess the risks as a whole, including the consideration of the human subjective factor in risk assessment, which is extremely important for critical infrastructure, especially in the energy sector.…”
Section: Cyber Security In Substation Automation Systemsmentioning
confidence: 99%
“…Software and hardware must follow a strict quality assurance, for example, to avoid getting infected by viruses or worms from wider networks [2], [19]. Cybersecurity procedures include strategies, security principles, security guarantees, guidelines, and risk management approaches [20]. Human resources relate to personnel that has to be equipped with skills and knowledge that are up-to-date and are continuously refreshed through training [21] (otherwise, the personnel can also turn into a threat [22]).…”
Section: A Cybersecurity and Cyberattacksmentioning
confidence: 99%
“…Risk can be defined as a combined frequency or probability and consequences of an event or incident that may compromise a system [20], [14]. Another way of expressing risk is the likelihood that a certain vulnerability of a particularly attractive object as the target will be manipulated by a certain threat leading to undesired consequences [54].…”
Section: A Cybersecurity Risk Assessment In Nuclear Facilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Approval of mandatory requirements for formalizing the results of compliance assessment of high-confidence information protection software [1] lent relevance to the use of mathematical models for assessing IS software performance reliability and safety. Although studies into mathematical models for software reliability assessment were first undertaken back in the second half of the last century [2,3], these issues remain relevant nowadays [4][5][6][7][8][9][10][11][12][13][14][15][16]. All this relates both to software manufacturing technologies (for example, open source software) and to newly introduced international standards in the software engineering and information security area (ISO/IEC 15408, ISO/IEC 33001, IEC 61508, IEC 61511 etc.)…”
Section: Introductionmentioning
confidence: 99%