METHODOLOGY FOR CONSTRUCTING ATTACK GRAPH FOR OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Critical Infrastructure Attack Modeling

The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...

متن کامل

Security Assessment Methodology for Critical Infrastructure Components

Protecting critical infrastructure assets such as telecommunications networks and energy generation and distribution facilities from cyber attacks is a major challenge. However, because security is a complex and multi-layered topic, a foundation for manufacturers to assess the security of products used in critical infrastructures is often missing. This paper describes a structured security asse...

متن کامل

Critical Infrastructure Protection: A Holistic Methodology for Greece

The protection of Critical Infrastructures (CI) is, by definition, of high importance for the welfare of citizens, due to direct threats (dictated by the current international political situation) and also due to their dependencies at international and European levels. Today, Greece remains one of the countries of the European Union, which has no comprehensive strategy to safeguard national CI,...

متن کامل

An Integrated Methodology For Critical Infrastructure Modeling And Simulation

Integral to effective critical infrastructure analysis is the assessment of infrastructure vulnerabilities, which provides insights into potential disruptions that can enhance protection plans and response and recovery operations. Effective critical infrastructures analysis, however, must account for the complex, multi-dimensional characteristics of infrastructures and the dependencies between ...

متن کامل

Attack Modeling in the Critical Infrastructure

The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit numerous known as well as unknown vulnerabilities in one course of an attack. The paper proposes...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ??????? ????. ???????????? ? ?????????????? ?????

سال: 2022

ISSN: ['2225-5443', '2225-5435']

DOI: https://doi.org/10.14529/secur220305