2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2017
DOI: 10.1109/iwcmc.2017.7986568
|View full text |Cite
|
Sign up to set email alerts
|

Security management of cyber physical control systems using NIST SP 800-82r2

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
4
1

Relationship

2
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…The [24] used previously in industrial settings [25]; applied to industry standards [26] [27]; and applied to cloud environments [27] [28]. The cost/benefits risk assessment of the project [2] was carried out by computing the Mean Failure Cost (MFC) for various UPS stakeholders addressing grid vulnerability, consequence, and risk analysis.…”
Section: Process and Resultsmentioning
confidence: 99%
“…The [24] used previously in industrial settings [25]; applied to industry standards [26] [27]; and applied to cloud environments [27] [28]. The cost/benefits risk assessment of the project [2] was carried out by computing the Mean Failure Cost (MFC) for various UPS stakeholders addressing grid vulnerability, consequence, and risk analysis.…”
Section: Process and Resultsmentioning
confidence: 99%
“…The CIP standard documents associated to the security management are shown in Table 2. It is also worth mentioning that the SP800-82 special publication published by the NIST document [25,26] provides recommendations and best practices for the security of industrial control systems, including, for example, SCADA (Supervisory Control And Data Acquisition) systems, DCS (Distributed Control System) and other control system configurations, such as PLCs (Programmable Logic Controllers). This technical document also identifies common security threats and vulnerabilities in the scope of industrial systems and provides recommended security countermeasures to mitigate the associated risks.…”
Section: National Standardsmentioning
confidence: 99%
“…Existing cyber security risk frameworks for ICS fall into three main categories: i) international/national standards and guidelines on ICS cyber security [1]- [3]; ii) quantitative risk assessment [4], [5]; and iii) attack tree approaches [6]- [8]. Standards provide a high level guidance for improving and managing cyber security risks in ICS contexts.…”
Section: Related Workmentioning
confidence: 99%