메뉴 건너뛰기




Volumn , Issue , 2016, Pages 93-101

Achieving ICS resilience and security through granular data flow management

Author keywords

Data flow; Industrial control systems; Resilience; Risk assessment; SCADA; Security; Socio technical systems

Indexed keywords

CONTROL SYSTEMS; DATA HANDLING; DATA TRANSFER; EMBEDDED SYSTEMS; RISK ASSESSMENT; SCADA SYSTEMS;

EID: 85001759344     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2994487.2994498     Document Type: Conference Paper
Times cited : (17)

References (38)
  • 7
    • 85001526610 scopus 로고    scopus 로고
    • The IT vs. OT debate | Intelligent Utility
    • P. Carson. The IT vs. OT debate | Intelligent Utility. Intelligent Utility Magazine, pages 32-34, 2010.
    • (2010) Intelligent Utility Magazine , pp. 32-34
    • Carson, P.1
  • 8
    • 84872109350 scopus 로고    scopus 로고
    • Retrieved: December, 2015
    • Centre for the Protection of National Infrastructure. Cyber Security. http://www.cpni.gov.uk/advice/cyber/. Retrieved: December, 2015.
    • Cyber Security
  • 9
    • 79955786768 scopus 로고    scopus 로고
    • Retrieved: December, 2015
    • Centre for the Protection of National Infrastructure. Risk Assessment. http://www.cpni.gov.uk/Security-Planning/Business-continuity-plan/Risk-assessment/. Retrieved: December, 2015.
    • Risk Assessment
  • 10
    • 84964808775 scopus 로고    scopus 로고
    • Retrieved: January, 2016
    • Centre for the Protection of National Infrastructure. The National Infrastructure. http://www.cpni.gov.uk/about/cni/, 2014. Retrieved: January, 2016.
    • (2014) The National Infrastructure
  • 12
    • 85001526523 scopus 로고    scopus 로고
    • Centre for the Protection of National Infrastructure
    • Centre for the Protection of National Infrastructure. Select and Implement Security Improvements. 2015.
    • (2015) Select and Implement Security Improvements
  • 13
    • 85001653810 scopus 로고    scopus 로고
    • Retrieved: July, 2016
    • Check Point Software Technologies. Critical Infrastructure & ICS/SCADA. https://www.checkpoint.com/products-solutions/critical-infrastructure/, 2016. Retrieved: July, 2016.
    • (2016) Critical Infrastructure & ICS/SCADA
  • 19
    • 57649090183 scopus 로고    scopus 로고
    • Information Security Management Standards: Compliance, Governance and Risk Management
    • E. Humphreys. Information Security Management Standards: Compliance, Governance and Risk Management. Information Security Technical Report, 13(4):247-255, 2008.
    • (2008) Information Security Technical Report , vol.13 , Issue.4 , pp. 247-255
    • Humphreys, E.1
  • 20
    • 84880713047 scopus 로고    scopus 로고
    • Guide for Conducting Risk Assessments
    • Joint Task Force Transformation Initiative. Guide for Conducting Risk Assessments. NIST Publication, 2012.
    • (2012) NIST Publication
  • 21
    • 85001803480 scopus 로고    scopus 로고
    • Security and Privacy Controls for Federal Information Systems and Organizations Security and Privacy Controls for Federal Information Systems and Organizations
    • Joint Task Force Transformation Initiative. Security and Privacy Controls for Federal Information Systems and Organizations Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication, 2013.
    • (2013) NIST Special Publication
  • 23
    • 85001710679 scopus 로고    scopus 로고
    • Kaspersky Lab. Retrieved: June, 2015
    • Kaspersky Lab. ICS Vulnerabilities Statistics 2015. http://tinyurl.com/jh4658o, 2015. Retrieved: June, 2015.
    • (2015) ICS Vulnerabilities Statistics 2015
  • 28
    • 85001619833 scopus 로고    scopus 로고
    • Design and Construction of an Industrial Control System Testbed
    • B. Paske, B. Green, D. Prince, and D. Hutchison. Design and Construction of an Industrial Control System Testbed. In PGNET, pages 151-156, 2014.
    • (2014) PGNET , pp. 151-156
    • Paske, B.1    Green, B.2    Prince, D.3    Hutchison, D.4
  • 29
    • 34548244594 scopus 로고    scopus 로고
    • Managing enterprise security risk with NIST standards
    • R. Ross. Managing enterprise security risk with NIST standards. Computer, 40(8):88-91, 2007.
    • (2007) Computer , vol.40 , Issue.8 , pp. 88-91
    • Ross, R.1
  • 33
    • 85001818941 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security. Retrieved: September, 2016
    • U.S. Department of Homeland Security. Assessment Program Overview. https://ics-cert.us-cert.gov/Assessments, 2016. Retrieved: September, 2016.
    • (2016) Assessment Program Overview
  • 34
    • 85001670181 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security. Retrieved: September, 2016
    • U.S. Department of Homeland Security. Control Systems Architecture Analysis Services. http://tinyurl.com/gnr4g5g, 2016. Retrieved: September, 2016.
    • (2016) Control Systems Architecture Analysis Services
  • 35
    • 85001615833 scopus 로고    scopus 로고
    • U.S. Department of Homeland Security. Retrieved: September, 2016
    • U.S. Department of Homeland Security. Cyber Resilience Review & Cyber Security Evaluation Tool. http://tinyurl.com/jqes9te, 2016. Retrieved: September, 2016.
    • (2016) Cyber Resilience Review & Cyber Security Evaluation Tool
  • 38
    • 85001539224 scopus 로고    scopus 로고
    • Wireshark.org. Retrieved: July, 2016
    • Wireshark.org. About Wireshark. https://www.wireshark.org/, 2016. Retrieved: July, 2016.
    • (2016) About Wireshark


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.