Event-based Security Policy and Formal Model of Critical Information Infrastructures Protecting Mechanism
نویسندگان
چکیده
منابع مشابه
Architectural Model for Information Security Analysis of Critical Information Infrastructures
Critical Information Infrastructures (CII) are computer systems and networks that support and control operations of many critical infrastructures that our society depends on, such as power plants, electrical grids, and water and waste facilities. Since the operations of CII also effect physical world, they are a good example of large-scale, critical cyber-physical systems. In recent years, CII ...
متن کاملApproach to security assessment of critical infrastructures' information systems
This article presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary syste...
متن کاملCyber Security Threats to Safety-critical, Space-based Infrastructures
Space-based systems play an important role within national critical infrastructures. They are being integrated into advanced air-traffic management applications, rail signalling systems, energy distribution software etc. Unfortunately, the end users of communications, location sensing and timing applications often fail to understand that these infrastructures are vulnerable to a wide range of s...
متن کاملModel-Based Security Event Management
With the growing size and complexity of current ICT infrastructures, it becomes increasingly challenging to gain an overview of potential security breaches. Security Information and Event Management systems which aim at collecting, aggregating and processing securityrelevant information are therefore on the rise. However, the event model of current systems mostly describes network events and th...
متن کاملChapter 2 CYBERSPACE POLICY FOR CRITICAL INFRASTRUCTURES
The first step in preparing any battlespace is to define the domain for attack and maneuver. The various military service components have directed authority to focus their efforts in specific domains of operations (e.g., naval operations are mainly in the maritime domain). However, cyberspace operations pose challenges because they span multiple operational domains. This paper focuses on U.S. c...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of Telecommunication Universities
سال: 2019
ISSN: 1813-324X
DOI: 10.31854/1813-324x-2019-5-4-99-105