Critical Infrastructure Cyber-Security Risk Management

被引:0
|
作者
Spyridopoulos, Theodoros [1 ]
Maraslis, Konstantinos [2 ]
Tryfonas, Theo [2 ]
Oikonomou, George [2 ]
机构
[1] Univ West England, Bristol, Avon, England
[2] Univ Bristol, Bristol, Avon, England
关键词
Industrial Control Systems; Cyber-security; Risk Management; Game Theory; Viable System Model;
D O I
10.3233/978-1-61499-765-8-59
中图分类号
DF [法律]; D9 [法律];
学科分类号
0301 ;
摘要
Traditional IT cyber-security risk management methods are based on the evaluation of risks calculated as the likelihood of cyber-security incidents occurring. However, these probabilities are usually estimations or guesses based on past experience and incomplete data. Incorrect estimations can lead to errors in the evaluation of risks that can ultimately affect the protection of the system. This issue is also transferred to methods used in Industrial Control Systems (ICSs), as they are mainly adaptations of such traditional approaches. Additionally, conventional methods fail to adequately address the increasing threat environment and the highly interdependent critical nature of ICSs, while proposed methods by the research community are as yet far from providing a solution. The importance of securely managing ICS infrastructures is growing, as they are systems embedded in critical national infrastructure (e.g. city traffic lights controls) and thus a potentially attractive target for organized cyber-criminals and terrorists. In this Chapter we present a novel approach that combines Stafford Beer's Viable System Model (VSM) with Game Theory in order to develop a risk management process that addresses the above issues. The model we develop provides a holistic, cost-efficient cyber-security solution that takes into account interdependencies of critical components as well as the potential impact of different attack strategies.
引用
收藏
页码:59 / 76
页数:18
相关论文
共 50 条
  • [41] A critical review of cyber security and cyber terrorism - threats to critical infrastructure in the energy sector
    Kumar, Venkatachary Sampath
    Prasad, Jagdish
    Samikannu, Ravi
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2018, 14 (02) : 101 - 119
  • [42] Risk-averse bi-level stochastic network interdiction model for cyber-security risk management
    Bhuiyan, Tanveer Hossain
    Medal, Hugh R.
    Nandi, Apurba K.
    Halappanavar, Mahantesh
    [J]. INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 32 (32)
  • [43] Cyber-Security of Smart Microgrids: A Survey
    Nejabatkhah, Farzam
    Li, Yun Wei
    Liang, Hao
    Reza Ahrabi, Rouzbeh
    [J]. ENERGIES, 2021, 14 (01)
  • [44] Cyber-security: Who will provide protection?
    ViaSat, United Kingdom
    [J]. Comput. Fraud Secur., 12 (19-20): : 19 - 20
  • [45] On SCADA PLC and Fieldbus Cyber-Security
    Davidson, Cordell
    Andel, Todd
    Yampolskiy, Mark
    McDonald, Todd
    Glisson, Brad
    Thomas, Tom
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2018), 2018, : 140 - 148
  • [46] Virtual Cyber-Security Testing Capability for large scale distributed information infrastructure protection
    Pederson, Perry
    Lee, David
    Shu, Guoqiang
    Chen, Dongluo
    Liu, Zhijun
    Li, Na
    Sang, Lifeng
    [J]. 2008 IEEE CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, VOLS 1 AND 2, 2008, : 372 - +
  • [47] Protection of Critical Infrastructure in National Cyber Security Strategies
    Izycki, Eduardo
    Colli, Rodrigo
    [J]. PROCEEDINGS OF THE 18TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2019), 2019, : 219 - 228
  • [48] Trust but Verify Critical Infrastructure Cyber Security Solutions
    Holstein, Dennis K.
    Stouffer, Keith
    [J]. 43RD HAWAII INTERNATIONAL CONFERENCE ON SYSTEMS SCIENCES VOLS 1-5 (HICSS 2010), 2010, : 4635 - 4642
  • [49] Cyber-security in robotics and autonomous systems
    Matellan, Vicente
    Bonaci, Tamara
    Sabaliauskaite, Giedre
    [J]. ROBOTICS AND AUTONOMOUS SYSTEMS, 2018, 100 : 41 - 42
  • [50] THE IMPORTANCE AND ROLE OF NATO IN CYBER-SECURITY
    Cioaca, Catalin
    [J]. 15TH INTERNATIONAL CONFERENCE THE KNOWLEDGE-BASED ORGANIZATION: MILITARY SCIENCES. SECURITY AND DEFENSE, CONFERENCE PROCEEDINGS 1, 2009, 1 : 158 - 162