2016
DOI: 10.1109/jproc.2015.2512235
|View full text |Cite
|
Sign up to set email alerts
|

The Cybersecurity Landscape in Industrial Control Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
132
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 277 publications
(132 citation statements)
references
References 69 publications
0
132
0
Order By: Relevance
“…The work reports as well discussions from control and security practitioners. McLaughlin et al analyze in [44] different testbeds and conclude that it is necessary to use pathways between cyber and physical components of the system in order to detect attacks. Also, Koutsandria et al [45] implement a testbed where the data are crosschecked, using cyber and physical elements.…”
Section: Implementation Of Experimental Testbedsmentioning
confidence: 99%
“…The work reports as well discussions from control and security practitioners. McLaughlin et al analyze in [44] different testbeds and conclude that it is necessary to use pathways between cyber and physical components of the system in order to detect attacks. Also, Koutsandria et al [45] implement a testbed where the data are crosschecked, using cyber and physical elements.…”
Section: Implementation Of Experimental Testbedsmentioning
confidence: 99%
“…Measurements for information security risks are defined appropriately. The security assessment process of ICS may consist of document analysis, mission and asset prioritization, vulnerability extrapolation, assessment environment, testing and impact, vulnerability remediation, validation testing, and monitoring [10]. Treatments to deal with safety and security risks will be integrated to satisfy both sides.…”
Section: Risk Assessment Process For Industrial Control Systemsmentioning
confidence: 99%
“…Supervisory Control and Data Acquisition (SCADA) systems for CIs are frequently deemed vulnerable due to a mix of mindset preconceptions, design faults, and insecure technologies [2]. Moreover, Industrial Automation and Control Systems (IACS) security requires a domain-specific security approach that cannot be effectively achieved through the straightforward adoption of Information and Communications Technology (ICT) security mechanisms, tools and techniques [3].…”
Section: Introductionmentioning
confidence: 99%