-
7
-
-
85001526610
-
The IT vs. OT debate | Intelligent Utility
-
P. Carson. The IT vs. OT debate | Intelligent Utility. Intelligent Utility Magazine, pages 32-34, 2010.
-
(2010)
Intelligent Utility Magazine
, pp. 32-34
-
-
Carson, P.1
-
8
-
-
84872109350
-
-
Retrieved: December, 2015
-
Centre for the Protection of National Infrastructure. Cyber Security. http://www.cpni.gov.uk/advice/cyber/. Retrieved: December, 2015.
-
Cyber Security
-
-
-
9
-
-
79955786768
-
-
Retrieved: December, 2015
-
Centre for the Protection of National Infrastructure. Risk Assessment. http://www.cpni.gov.uk/Security-Planning/Business-continuity-plan/Risk-assessment/. Retrieved: December, 2015.
-
Risk Assessment
-
-
-
10
-
-
84964808775
-
-
Retrieved: January, 2016
-
Centre for the Protection of National Infrastructure. The National Infrastructure. http://www.cpni.gov.uk/about/cni/, 2014. Retrieved: January, 2016.
-
(2014)
The National Infrastructure
-
-
-
12
-
-
85001526523
-
-
Centre for the Protection of National Infrastructure
-
Centre for the Protection of National Infrastructure. Select and Implement Security Improvements. 2015.
-
(2015)
Select and Implement Security Improvements
-
-
-
13
-
-
85001653810
-
-
Retrieved: July, 2016
-
Check Point Software Technologies. Critical Infrastructure & ICS/SCADA. https://www.checkpoint.com/products-solutions/critical-infrastructure/, 2016. Retrieved: July, 2016.
-
(2016)
Critical Infrastructure & ICS/SCADA
-
-
-
16
-
-
84929295094
-
Converged Plantwide Ethernet (CPwE) Design and Implementation Guide
-
P. Didier, F. Macias, J. Harstad, R. Antholine, A. Johnston, S, S. Piyecsky, M. Schillace, G. Wilcox, D. Zaniewski, and S. Zuponcic. Converged Plantwide Ethernet (CPwE) Design and Implementation Guide. CISCO Systems and Rockwell Automation, 2011.
-
(2011)
CISCO Systems and Rockwell Automation
-
-
Didier, P.1
Macias, F.2
Harstad, J.3
Antholine, R.4
Johnston, A.5
Piyecsky, S.S.6
Schillace, M.7
Wilcox, G.8
Zaniewski, D.9
Zuponcic, S.10
-
17
-
-
85022328702
-
Testbed Diversity as a Fundamental Principle for Effective ICS Security Research
-
B. Green, D. Hutchison, S. A. F. Frey, and A. Rashid. Testbed Diversity as a Fundamental Principle for Effective ICS Security Research. In International Workshop on Security and Resilience of Cyber-Physical Infrastructures, pages 1-8, 2016.
-
(2016)
International Workshop on Security and Resilience of Cyber-Physical Infrastructures
, pp. 1-8
-
-
Green, B.1
Hutchison, D.2
Frey, S.A.F.3
Rashid, A.4
-
18
-
-
84964873181
-
Socio-Technical Security Analysis of Industrial Control Systems (ICS)
-
B. Green, D. Prince, U. Roedig, J. Busby, and D. Hutchison. Socio-Technical Security Analysis of Industrial Control Systems (ICS). In 2nd International Symposium for ICS & SCADA Cyber Security Research(ICS-CSR), 2014.
-
(2014)
2nd International Symposium for ICS & SCADA Cyber Security Research(ICS-CSR)
-
-
Green, B.1
Prince, D.2
Roedig, U.3
Busby, J.4
Hutchison, D.5
-
19
-
-
57649090183
-
Information Security Management Standards: Compliance, Governance and Risk Management
-
E. Humphreys. Information Security Management Standards: Compliance, Governance and Risk Management. Information Security Technical Report, 13(4):247-255, 2008.
-
(2008)
Information Security Technical Report
, vol.13
, Issue.4
, pp. 247-255
-
-
Humphreys, E.1
-
20
-
-
84880713047
-
Guide for Conducting Risk Assessments
-
Joint Task Force Transformation Initiative. Guide for Conducting Risk Assessments. NIST Publication, 2012.
-
(2012)
NIST Publication
-
-
-
21
-
-
85001803480
-
Security and Privacy Controls for Federal Information Systems and Organizations Security and Privacy Controls for Federal Information Systems and Organizations
-
Joint Task Force Transformation Initiative. Security and Privacy Controls for Federal Information Systems and Organizations Security and Privacy Controls for Federal Information Systems and Organizations. NIST Special Publication, 2013.
-
(2013)
NIST Special Publication
-
-
-
23
-
-
85001710679
-
-
Kaspersky Lab. Retrieved: June, 2015
-
Kaspersky Lab. ICS Vulnerabilities Statistics 2015. http://tinyurl.com/jh4658o, 2015. Retrieved: June, 2015.
-
(2015)
ICS Vulnerabilities Statistics 2015
-
-
-
24
-
-
84964880630
-
Assurance Techniques for Industrial Control Systems (ICS)
-
ACM
-
W. Knowles, J. M. Such, A. Gouglidis, G. Misra, and A. Rashid. Assurance Techniques for Industrial Control Systems (ICS). In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy, pages 101-112. ACM, 2015.
-
(2015)
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy
, pp. 101-112
-
-
Knowles, W.1
Such, J.M.2
Gouglidis, A.3
Misra, G.4
Rashid, A.5
-
28
-
-
85001619833
-
Design and Construction of an Industrial Control System Testbed
-
B. Paske, B. Green, D. Prince, and D. Hutchison. Design and Construction of an Industrial Control System Testbed. In PGNET, pages 151-156, 2014.
-
(2014)
PGNET
, pp. 151-156
-
-
Paske, B.1
Green, B.2
Prince, D.3
Hutchison, D.4
-
29
-
-
34548244594
-
Managing enterprise security risk with NIST standards
-
R. Ross. Managing enterprise security risk with NIST standards. Computer, 40(8):88-91, 2007.
-
(2007)
Computer
, vol.40
, Issue.8
, pp. 88-91
-
-
Ross, R.1
-
30
-
-
80054695924
-
The Evolution of Factory and Building Automation
-
Sept
-
T. Sauter, S. Soucek, W. Kastner, and D. Dietrich. The Evolution of Factory and Building Automation. IEEE Industrial Electronics Magazine, 5(3):35-48, Sept 2011.
-
(2011)
IEEE Industrial Electronics Magazine
, vol.5
, Issue.3
, pp. 35-48
-
-
Sauter, T.1
Soucek, S.2
Kastner, W.3
Dietrich, D.4
-
32
-
-
84881143298
-
Guide to Industrial Control Systems (ICS) Security
-
K. Stouffer, S. Lightman, V. Pillitteri, M. Abrams, and A. Hahn. Guide to Industrial Control Systems (ICS) Security. NIST Special Publication, 2015.
-
(2015)
NIST Special Publication
-
-
Stouffer, K.1
Lightman, S.2
Pillitteri, V.3
Abrams, M.4
Hahn, A.5
-
33
-
-
85001818941
-
-
U.S. Department of Homeland Security. Retrieved: September, 2016
-
U.S. Department of Homeland Security. Assessment Program Overview. https://ics-cert.us-cert.gov/Assessments, 2016. Retrieved: September, 2016.
-
(2016)
Assessment Program Overview
-
-
-
34
-
-
85001670181
-
-
U.S. Department of Homeland Security. Retrieved: September, 2016
-
U.S. Department of Homeland Security. Control Systems Architecture Analysis Services. http://tinyurl.com/gnr4g5g, 2016. Retrieved: September, 2016.
-
(2016)
Control Systems Architecture Analysis Services
-
-
-
35
-
-
85001615833
-
-
U.S. Department of Homeland Security. Retrieved: September, 2016
-
U.S. Department of Homeland Security. Cyber Resilience Review & Cyber Security Evaluation Tool. http://tinyurl.com/jqes9te, 2016. Retrieved: September, 2016.
-
(2016)
Cyber Resilience Review & Cyber Security Evaluation Tool
-
-
-
38
-
-
85001539224
-
-
Wireshark.org. Retrieved: July, 2016
-
Wireshark.org. About Wireshark. https://www.wireshark.org/, 2016. Retrieved: July, 2016.
-
(2016)
About Wireshark
-
-
|