2004
DOI: 10.2202/1547-7355.1075
|View full text |Cite
|
Sign up to set email alerts
|

Risks of Terrorism to Information Technology and to Critical Interdependent Infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 35 publications
(23 citation statements)
references
References 17 publications
0
22
0
Order By: Relevance
“…Subsequently, the TSS was modified and extended to incorporate HHM [Kaplan, Haimes, and Garrick, 2001]. Chittester and Haimes [2004] present a detailed discussion of the sources of risk to a supervisory control and data acquisition (SCADA) system used by railways and identified through HHM. The vulnerabilities of SCADA CIS to terrorist attacks were explored through three major perspective categories: (i) hardware and software; (ii) human supervisory; and (iii) the system's environment.…”
Section: Theory Of Scenario Structuringmentioning
confidence: 99%
“…Subsequently, the TSS was modified and extended to incorporate HHM [Kaplan, Haimes, and Garrick, 2001]. Chittester and Haimes [2004] present a detailed discussion of the sources of risk to a supervisory control and data acquisition (SCADA) system used by railways and identified through HHM. The vulnerabilities of SCADA CIS to terrorist attacks were explored through three major perspective categories: (i) hardware and software; (ii) human supervisory; and (iii) the system's environment.…”
Section: Theory Of Scenario Structuringmentioning
confidence: 99%
“…Chittester and Haimes described HHM as a method that "can identify all conceivable sources of risk to SCADA systems and to the utilities and infrastructure that uses them" [67]. The method aims to represent the diverse characteristics and attributes of a system.…”
Section: Published Research On Overall Risk Assessmentmentioning
confidence: 99%
“…This makes it the ideal application for SCADA systems and their associated interdependent and interconnected infrastructures [68]. This method has been used to identify sources of risk to SCADA systems in the railroad sector [67].…”
Section: Published Research On Overall Risk Assessmentmentioning
confidence: 99%
“…The influence of these events on the modeling literature is twofold. First, there is an increased awareness of the need for interdisciplinary approaches that consider a broader range of factors and systems in vulnerability modeling so that new causal mechanisms, interdependencies, and socio-technical responses are considered [Chittister and Haimes, 2004;Cutter, Richardson and Wilbanks, 2003]. Secondly, the need to implement systems approaches and systems-of-systems approaches has been suggested as a means to manage the extreme complexity inherent in the wider problem scope [Jain and McLean, 2003;Little, 2004;Rinaldi, 2004].…”
Section: Introductionmentioning
confidence: 99%