2013
DOI: 10.1016/j.ijcip.2013.05.002
|View full text |Cite
|
Sign up to set email alerts
|

Securing wastewater facilities from accidental and intentional harm: A cost-benefit analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 13 publications
0
3
0
Order By: Relevance
“…The attackers generally acquire the following goals step by step: (1) compromising the station management authority by launching cyberattacks, 16 (2) reducing the station capacity using the compromised authority, (3) propagating the station incident in the CI network due to interdependences, 17 and (4) causing negative impact on society. 18,19 On the contrary, the CI defenders need to perform the following operations: (1) making security strategy to prevent the authority compromise and capacity reduction within the station, (2) making scheduling strategy to prevent the incident propagating in the CI network, and (3) making policy to mitigate the negative impact on society. According to the above discussion, the station operation and CI states are changed with attacks propagating.…”
Section: Analysis Of Response Strategy Making In Cismentioning
confidence: 99%
“…The attackers generally acquire the following goals step by step: (1) compromising the station management authority by launching cyberattacks, 16 (2) reducing the station capacity using the compromised authority, (3) propagating the station incident in the CI network due to interdependences, 17 and (4) causing negative impact on society. 18,19 On the contrary, the CI defenders need to perform the following operations: (1) making security strategy to prevent the authority compromise and capacity reduction within the station, (2) making scheduling strategy to prevent the incident propagating in the CI network, and (3) making policy to mitigate the negative impact on society. According to the above discussion, the station operation and CI states are changed with attacks propagating.…”
Section: Analysis Of Response Strategy Making In Cismentioning
confidence: 99%
“…SCADA systems were designed to work in a standalone way and relied on air-gapped networks and proprietary protocols for securing the system. Therefore, initial designs of SCADA never incorporated security features [2,3]. However in recent years, due to the expansion of business and need of central monitoring of distributed software, SCADA systems have evolved into sophisticated, complex open systems, connected to the Internet using advanced technology.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, when a failure occurs, a cost is initiated that corresponds to the caused damage to the surrounding infrastructure and the loss of water (Hadzilacos et al, 2000;Pelletier et al, 2003). Financial resources are often limited (Chang and Hernandez, 2008;Marinoni et al, 2012;Papa et al, 2013), such that strategies need to be designed for operators of underground water supply networks to manage these pipe failure costs effectively (Kleiner et al, 1998) by means of rehabilitation, ranging from repairs (also called relining) to the complete replacement of pipes (Rehan et al, 2011). Repairs may be sufficient in the case of relatively small failures, postponing thereby the replacement.…”
Section: Introductionmentioning
confidence: 99%