Resilient Without Zero Trust

被引:0
|
作者
Swearingen, Michael T. [1 ]
Michael, James Bret [2 ,3 ]
Weiss, Joseph [4 ]
Radvanovsky, Robert [5 ]
机构
[1] Tricty Elect Cooperat, Hooker, OK USA
[2] Naval Postgrad Sch, Dept Comp Sci, Monterey, CA 93943 USA
[3] Naval Postgrad Sch, Dept Elect & Comp Engn, Monterey, CA 93943 USA
[4] Appl Control Syst LLC, Cupertino, CA 95014 USA
[5] Infracritical Inc, Geneva, IL 60134 USA
关键词
Degradation; Control systems; Power systems; Zero Trust; Computer crime;
D O I
10.1109/MC.2023.3329672
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electric power grids are vulnerable to unintentional cyber incidents and cyberattacks, but their control systems make them resilient. The electric power grids can continue to function despite degradation, denial, or destruction of their OT networks.
引用
收藏
页码:120 / 122
页数:3
相关论文
共 50 条
  • [1] Trojan Resilient Computing in COTS Processors Under Zero Trust
    Hasan, Mahmudul
    Cruz, Jonathan
    Chakraborty, Prabuddha
    Bhunia, Swarup
    Hoque, Tamzidul
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2022, 30 (10) : 1412 - 1424
  • [2] A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
    Lei Meng
    Daochao Huang
    Jiahang An
    Xianwei Zhou
    Fuhong Lin
    [J]. China Communications, 2022, 19 (08) : 198 - 213
  • [3] A Continuous Authentication Protocol Without Trust Authority for Zero Trust Architecture
    Meng, Lei
    Huang, Daochao
    An, Jiahang
    Zhou, Xianwei
    Lin, Fuhong
    [J]. CHINA COMMUNICATIONS, 2022, 19 (08) : 198 - 213
  • [4] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Sedjelmaci, Hichem
    Kaaniche, Nesrine
    Tourki, Kamel
    [J]. JOURNAL OF NETWORK AND SYSTEMS MANAGEMENT, 2024, 32 (02)
  • [5] Secure and Resilient 6 G RAN Networks: A Decentralized Approach with Zero Trust Architecture
    Hichem Sedjelmaci
    Nesrine Kaaniche
    Kamel Tourki
    [J]. Journal of Network and Systems Management, 2024, 32
  • [6] Zero Trust
    Dirk Fox
    [J]. Datenschutz und Datensicherheit - DuD, 2022, 46 (3) : 174 - 175
  • [7] A 'resilient' urban morphology: TRUST
    du Plessis, Chrisna
    Landman, Karina
    Nel, Darren
    Peres, Edna
    [J]. URBAN MORPHOLOGY, 2015, 19 (02): : 183 - 184
  • [8] A Zero-Trust Network-Based Access Control Scheme for Sustainable and Resilient Industry 5.0
    Abuhasel, Khaled Ali
    [J]. IEEE ACCESS, 2023, 11 : 116398 - 116409
  • [9] Beyond Zero Trust: Trust Is a Vulnerability
    Campbell, Mark
    [J]. COMPUTER, 2020, 53 (10) : 110 - 113
  • [10] Questions of Trust in Norms of Zero Trust
    Wylde, Allison
    [J]. INTELLIGENT COMPUTING, VOL 3, 2022, 508 : 837 - 846