Model-Based Cybersecurity Analysis
نویسندگان
چکیده
Abstract Critical infrastructure (CIs) such as power grids link a plethora of physical components from many different vendors to the software systems that control them. These are constantly threatened by sophisticated cyber attacks. The need improve cybersecurity CIs, through holistic system modeling and vulnerability analysis, cannot be overstated. This is challenging since CI incorporates complex data multiple interconnected computation systems. Meanwhile, exploiting vulnerabilities in information technology (IT) operational (OT) leads various cascading effects due interconnections between paper investigates use comprehensive taxonomy model implied dependencies within bridging knowledge gap IT security OT security. complexity dependence analysis harnessed partitioning complicated into cyber-physical functional dependencies. defined further support cascade for severity assessment identification critical system. On top proposed taxonomy, suggests power-grid reference models enhance reproducibility applicability method. methodology followed was design science research (DSR) designing validation artifacts. More specifically, structural, adequacy, compatibility, coverage characteristics artifacts evaluated three-fold (two case studies expert interviews). first study uses two instantiated extracted existing architectures frameworks like IEC 62351 series. second involves real-world municipal grid.
منابع مشابه
mortality forecasting based on lee-carter model
over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...
15 صفحه اولMISSION AWARE: Evidence-Based, Mission-Centric Cybersecurity Analysis
Currently, perimeter-based approaches are the mainstay of cybersecurity. While this paradigm is necessary, there is mounting evidence of its insufficiency with respect to sophisticated and coordinated attacks. In contrast to perimeterbased security, mission-centric cybersecurity provides awareness of how attacks can influence mission success and therefore focuses resources for mitigating vulner...
متن کاملطراحی، ساخت و کنترل model based یک روبات موازی هگزا
توسعه و افزایش تولید صنایع و در پی آن رشد اقتصادی و اجتماعی یک جامعه در قرن جدید، با خودکار کردن روندهای تولید گره خورده است. یکی از اجزای خودکار ساختن صنایع، استفاده از روباتها در چرخه تولید به منظورهای مختلف می¬باشد؛ رنگ پاشی، جابجایی، نصب قطعات و جوشکاری بخش کوچکی از فضایی است که به روباتهای کارا نیازمند است. پس از استفاده فراوان از روباتهای سرال در صنایع و انجام پژوهشهای پایه¬ای بر روی طراح...
Challenge Based Learning in Cybersecurity Education
This paper describes the application of the Challenge Based Learning (CBL) methodology to cybersecurity education. The overall goal is to improve student learning via a multidisciplinary approach which encourages students to collaborate with their peers, ask questions, develop a deeper understanding of the subject and take actions in solving real-world challenges. In this study, students establ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Business & Information Systems Engineering
سال: 2023
ISSN: ['2363-7005', '1867-0202']
DOI: https://doi.org/10.1007/s12599-023-00811-0