Cyber Security Risk Assessment for Industrial Automation Platform

被引:10
|
作者
Zheng, Yiling [1 ]
Zheng, Song [2 ]
机构
[1] Fuzhou Univ, Coll Elect Engn & Automat, Fuzhou 350002, Peoples R China
[2] Fuzhou Univ, Coll Elect Engn & Automat, Fujian Prov Enterprise Key Lab Ind Control Cyber, Fuzhou 350002, Peoples R China
关键词
risk assessment; cyber security; Industrial Automation Platform; communication links;
D O I
10.1109/IIH-MSP.2015.58
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Due to the fact that the cyber security risks exist in industrial control system, risk assessment on Industrial Automation Platform (IAP) is discussed in this paper. The cyber security assessment model for IAP is built based on relevant standards at abroad. Fuzzy analytic hierarchy process and fuzzy comprehensive evaluation method based on entropy theory are utilized to evaluate the communication links' risk of IAP software. As a result, the risk weight of communication links which have impacts on platform and the risk level of this platform are given for further study on protective strategy. The assessment result shows that the methods used can evaluate this platform efficiently and practically.
引用
收藏
页码:341 / 344
页数:4
相关论文
共 50 条
  • [31] Standardized Cyber Security Risk Assessment for Unmanned Offshore Facilities
    Teglasy, Balint Z.
    Katsika, Sokratis
    Lundteigen, Mary Ann
    3RD INTERNATIONAL WORKSHOP ON ENGINEERING AND CYBERSECURITY OF CRITICAL SYSTEMS (ENCYCRIS 2022), 2022, : 33 - 40
  • [32] Trust as a human factor in holistic cyber security risk assessment
    Henshel, D.
    Cains, M. G.
    Hoffman, B.
    Kelley, T.
    6TH INTERNATIONAL CONFERENCE ON APPLIED HUMAN FACTORS AND ERGONOMICS (AHFE 2015) AND THE AFFILIATED CONFERENCES, AHFE 2015, 2015, 3 : 1117 - 1124
  • [33] Survey and Guidelines about Learning Cyber Security Risk Assessment
    Ponsard, Christophe
    Massonet, Philippe
    PROCEEDINGS OF THE 8TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY (ICISSP), 2021, : 536 - 543
  • [34] Risk Assessment Method for Insider Threats in Cyber Security: A Review
    Hashim, Nurul Akmal
    Abidin, Zaheera Zainal
    Zakaria, Nurul Azma
    Ahmad, Rabiah
    Puvanasvaran, A. P.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 126 - 130
  • [35] Safety and security risk assessment in cyber-physical systems
    Lyu, Xiaorong
    Ding, Yulong
    Yang, Shuang-Hua
    IET CYBER-PHYSICAL SYSTEMS: THEORY & APPLICATIONS, 2019, 4 (03) : 221 - 232
  • [36] Cyber-Physical Simulation Platform for Security Assessment of Transactive Energy Systems
    Zhang, Yue
    Eisele, Scott
    Dubey, Abhishek
    Laszka, Aron
    Srivastava, Anurag K.
    2019 7TH WORKSHOP ON MODELING AND SIMULATION OF CYBER-PHYSICAL ENERGY SYSTEMS (MSCPES), 2019,
  • [37] Cyber Security for Industrial Control Systems
    Cunningham, Steve
    POWER ENGINEERING, 2011, 115 (11) : 142 - +
  • [38] Cyber Security of Industrial Communication Protocols
    Su, Weilian
    Antoniou, Anastasios
    Eagle, Chris
    2017 22ND IEEE INTERNATIONAL CONFERENCE ON EMERGING TECHNOLOGIES AND FACTORY AUTOMATION (ETFA), 2017,
  • [39] Forensics for industrial cyber security investigations
    不详
    CONTROL ENGINEERING, 2009, 56 (03) : 22 - 22
  • [40] Security Risk Assessment and Weaknesses Identification of the Substation Automation System
    Guo, Jia
    Bao, Yingkai
    Yu, Bin
    Zeng, Zhian
    Wang, Liangyi
    Guo, Chuangxin
    2014 INTERNATIONAL CONFERENCE ON POWER SYSTEM TECHNOLOGY (POWERCON), 2014,