2018
DOI: 10.1080/23742917.2018.1554985
|View full text |Cite
|
Sign up to set email alerts
|

Securing industrial control system environments: the missing piece

Abstract: Cyber-attacks on Industrial Control Systems (ICS) are no longer matters of anticipation. Industrial infrastructures are continually being targeted by malicious cyber actors with very little resistance on their paths. From network breaches to data theft, denial of service attacks to privilege escalation; command and control functions have in some way been exerted on targeted industrial systems. Safety, security, resilience, reliability and performance require private industrial control system user organizations… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 78 publications
0
8
0
Order By: Relevance
“…Ani et al [16] and Akbarzadeh & Katsikas [17] introduced the concept of functional dependency modelling analysis that evaluates the cascading effect of physical connections of ICS components within a three-level architecture and analyses the security features in each level. Based on the identified assets, the authors used the Attack tree method to define cyber events (what would happen to the system), considering known threats and vulnerabilities within the level.…”
Section: Related Workmentioning
confidence: 99%
“…Ani et al [16] and Akbarzadeh & Katsikas [17] introduced the concept of functional dependency modelling analysis that evaluates the cascading effect of physical connections of ICS components within a three-level architecture and analyses the security features in each level. Based on the identified assets, the authors used the Attack tree method to define cyber events (what would happen to the system), considering known threats and vulnerabilities within the level.…”
Section: Related Workmentioning
confidence: 99%
“…Although some of the frameworks in Table 2 are specific to the water sector, the majority are more generic for all types of CI. An evaluation of these has revealed that even though ICS cybersecurity requirements are not adequately addressed by information security, IT security and security audit assurance practices ( Krotofil et al , 2019; Ani et al , 2018; Weiss, 2014), these are still widely used in ICS environments for the protection of CI (Knowles et al , 2015). A process flow of the development of the CI cybersecurity capability framework is shown in Figure 6.…”
Section: Cybersecurity Resilience Framework For Critical Infrastructu...mentioning
confidence: 99%
“…In addition, responses in form of solutions are typically responsive to, and trail similar paths as the direction of growing malicious events. Moreover, these sectors appear not to be suffering increasing cyber-attacks judging by known recorded incidents [43]. While it may be rational to focus solutions where there are greater threats and risk challenges, the potentials for common cause failures are very imminent, hence, it is crucial to also give a good measure of attention other CI sectors.…”
Section: Transportation Water and Waste Water And Chemical Industriesmentioning
confidence: 99%