Critical Infrastructure Cyber-Security Risk Management

被引:0
|
作者
Spyridopoulos, Theodoros [1 ]
Maraslis, Konstantinos [2 ]
Tryfonas, Theo [2 ]
Oikonomou, George [2 ]
机构
[1] Univ West England, Bristol, Avon, England
[2] Univ Bristol, Bristol, Avon, England
关键词
Industrial Control Systems; Cyber-security; Risk Management; Game Theory; Viable System Model;
D O I
10.3233/978-1-61499-765-8-59
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly adaptations of such traditional approaches. Additionally, conventional methods fail to adequately address the increasing threat environment and the highly interdependent critical nature of ICSs, while proposed methods by the research community are as yet far from providing a solution. The importance of securely managing ICS infrastructures is growing, as they are systems embedded in critical national infrastructure (e.g. city traffic lights controls) and thus a potentially attractive target for organized cyber-criminals and terrorists. In this Chapter we present a novel approach that combines Stafford Beer's Viable System Model (VSM) with Game Theory in order to develop a risk management process that addresses the above issues. The model we develop provides a holistic, cost-efficient cyber-security solution that takes into account interdependencies of critical components as well as the potential impact of different attack strategies.
引用
收藏
页码:59 / 76
页数:18
相关论文
共 50 条
  • [1] Towards a General Information Security Management Assessment Framework to Compare Cyber-Security of Critical Infrastructure Organizations
    Bernroider, Edward W. N.
    Margiol, Sebastian
    Taudes, Alfred
    [J]. RESEARCH AND PRACTICAL ISSUES OF ENTERPRISE INFORMATION SYSTEMS, 10TH IFIP WG 8.9 WORKING CONFERENCE, CONFENIS 2016, 2016, 268 : 127 - 141
  • [2] Cyber Security Risk Management in the SCADA Critical Infrastructure Environment
    Henrie, Morgan
    [J]. ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 38 - 45
  • [3] Cyber-Security Risk Assessment Framework for Critical Infrastructures
    Baig, Zubair
    Zeadally, Sherali
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2019, 25 (01): : 121 - 129
  • [4] Key competencies for critical infrastructure cyber-security: a systematic literature review
    Chowdhury, Nabin
    Gkioulos, Vasileios
    [J]. INFORMATION AND COMPUTER SECURITY, 2021, 29 (05) : 697 - 723
  • [5] The Cyber-Security State of our Nation: A Critique of South Africa's Stance on Cyber-Security in Respect of the Protection of Critical Information Infrastructure
    Mohideen, Feroze
    [J]. PROCEEDINGS OF THE 11TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2016), 2016, : 235 - 243
  • [6] An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
    Kure, Halima Ibrahim
    Islam, Shareeful
    Mouratidis, Haralambos
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (18): : 15241 - 15271
  • [7] An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
    Halima Ibrahim Kure
    Shareeful Islam
    Haralambos Mouratidis
    [J]. Neural Computing and Applications, 2022, 34 : 15241 - 15271
  • [8] Methodology for risk management related to cyber-security of Unmanned Aircraft Systems
    Tran, Trung Duc
    Thiriet, Jean-Marc
    Marchand, Nicolas
    El Mrabti, Amin
    Luculli, Gabriele
    [J]. 2019 24TH IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2019, : 695 - 702
  • [9] Beyond the Castle Model of cyber-risk and cyber-security
    Leuprecht, Christian
    Skillicorn, David B.
    Tait, Victoria E.
    [J]. GOVERNMENT INFORMATION QUARTERLY, 2016, 33 (02) : 250 - 257
  • [10] Risk perceptions of cyber-security and precautionary behaviour
    van Schaik, Paul
    Jeske, Debora
    Onibokun, Joseph
    Coventry, Lynne
    Jansen, Jurjen
    Kusev, Petko
    [J]. COMPUTERS IN HUMAN BEHAVIOR, 2017, 75 : 547 - 559