2018
DOI: 10.1115/1.4040650
|View full text |Cite
|
Sign up to set email alerts
|

Planning the Selection and Assignment of Security Forensics Countermeasures

Abstract: Cybersecurity incidents are stressful, complex in nature, and are frequently not systematically considered in daily tasks. When correctly managed, operational readiness procedures ensure the availability of data required to successfully and quickly recover from a security incident, while lessening the adverse effect. Therefore, protective measures, such as implementation of data diodes, are playing an essential role in defending instrumentation and control (I&C) systems. In addition, applicability of the n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 1 publication
0
1
0
Order By: Relevance
“…[29] Security should be supported with forensics, prognostics, and recovery plans for the analysis of cyber-attacks and coordination for identifying external cyber-attack vectors. [26,30,31] An internal track and trace network process can assist in detecting or preventing the existence of weaknesses in the logistics security controls. [32,33] A process for anti-malicious and anti-tamper system engineering is needed to prevent vulnerabilities identified through reverse engineering attacks.…”
Section: Operational Themesmentioning
confidence: 99%
“…[29] Security should be supported with forensics, prognostics, and recovery plans for the analysis of cyber-attacks and coordination for identifying external cyber-attack vectors. [26,30,31] An internal track and trace network process can assist in detecting or preventing the existence of weaknesses in the logistics security controls. [32,33] A process for anti-malicious and anti-tamper system engineering is needed to prevent vulnerabilities identified through reverse engineering attacks.…”
Section: Operational Themesmentioning
confidence: 99%