METHODOLOGY FOR CONSTRUCTING ATTACK GRAPH FOR OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE
نویسندگان
چکیده
منابع مشابه
Critical Infrastructure Attack Modeling
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit several, also unknown, vulnerabilities in one course of an attack. The paper proposes an attack ...
متن کاملSecurity Assessment Methodology for Critical Infrastructure Components
Protecting critical infrastructure assets such as telecommunications networks and energy generation and distribution facilities from cyber attacks is a major challenge. However, because security is a complex and multi-layered topic, a foundation for manufacturers to assess the security of products used in critical infrastructures is often missing. This paper describes a structured security asse...
متن کاملCritical Infrastructure Protection: A Holistic Methodology for Greece
The protection of Critical Infrastructures (CI) is, by definition, of high importance for the welfare of citizens, due to direct threats (dictated by the current international political situation) and also due to their dependencies at international and European levels. Today, Greece remains one of the countries of the European Union, which has no comprehensive strategy to safeguard national CI,...
متن کاملAn Integrated Methodology For Critical Infrastructure Modeling And Simulation
Integral to effective critical infrastructure analysis is the assessment of infrastructure vulnerabilities, which provides insights into potential disruptions that can enhance protection plans and response and recovery operations. Effective critical infrastructures analysis, however, must account for the complex, multi-dimensional characteristics of infrastructures and the dependencies between ...
متن کاملAttack Modeling in the Critical Infrastructure
The development and connection of information and communication technologies with industrial control systems in the so-called critical infrastructure have contributed to the emergence of new complex threats. The critical infrastructure has become a target of sophisticated cyber attacks which exploit numerous known as well as unknown vulnerabilities in one course of an attack. The paper proposes...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ??????? ????. ???????????? ? ?????????????? ?????
سال: 2022
ISSN: ['2225-5443', '2225-5435']
DOI: https://doi.org/10.14529/secur220305