Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC)

نویسندگان

  • Qian Chen
  • Robert K. Abercrombie
  • Frederick T. Sheldon
چکیده

1 Industrial Control Systems (ICS) are commonly used in industries such as oil and natural gas, transportation, electric, water and wastewater, chemical, pharmaceutical, pulp and paper, food and beverage, as well as discrete manufacturing (e.g., automotive, aerospace, and durable goods.) SCADA systems are generally used to control dispersed assets using centralized data acquisition and supervisory control. Originally, ICS implementations were susceptible primarily to local threats because most of their components were located in physically secure areas (i.e., ICS components were not connected to IT networks or systems). The trend toward integrating ICS systems with IT networks (e.g., efficiency and the Internet of Things) provides significantly less isolation for ICS from the outside world thus creating greater risk due to external threats. Albeit, the availability of ICS/SCADA systems is critical to assuring safety, security and profitability. Such systems form the backbone of our national cyber-physical infrastructure. Herein, we extend the concept of mean failure cost (MFC) to address quantifying availability to harmonize well with ICS security risk assessment. This new measure is based on the classic formulation of Availability combined with Mean Failure Cost (MFC). The metric offers a computational basis to estimate the availability of a system in terms of the loss that each stakeholder stands to sustain as a result of security violations or breakdowns (e.g., deliberate malicious failures).

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison between four dissimilar solar panel configurations

Several studies on photovoltaic systems focused on how it operates and energy required in operating it. Little attention is paid on its configurations, modeling of mean time to system failure, availability, cost benefit and comparisons of parallel and series–parallel designs. In this research work, four system configurations were studied. Configuration I consists of two sub-components arranged ...

متن کامل

Mean Failure Cost as a Measurable Value and Evidence of Cybersecurity: E-Learning Case Study

Addressing Cybersecurity within e-Learning systems becomes empowered to make online information more secure. Certain competences need to be identified as necessary skills to manage security online such the ability to assess sources and architectural components, understanding the privacy, confidentiality and user authentication. Security management approaches quantifying security threats in e-le...

متن کامل

Implementation Procedures for the Risk in Early Design (RED) Method

Risk assessments performed at the conceptual design phase of a product may offer the greatest opportunity to increase product safety and reliability at the least cost. This is an especially difficult proposition, however, as often the product has not assumed a physical form at this early design stage. This paper introduces the Risk in Early Design (RED) method, a method for performing risk asse...

متن کامل

A Model for Runway Landing Flow and Capacity with Risk and Cost Benefit Factors

As the demand for the civil aviation has been growing for decades and the system becoming increasingly complex, the use of systems engineering and operations research tools have shown to be of further use in managing this system. In this study, we apply such tools in managing landing operations on runways (as the bottleneck and highly valuable resources of air transportation networks) to handle...

متن کامل

The Mean Failure Cost Cybersecurity Model toward Security Measures and Associated Mechanisms

This paper presents results of the quantification of security threats of e-learning system using an economic measure abridged by MFC (Mean Failure Cost). We study means to optimize this measure and to make it more precise, more useful in practice. First we develop basic security requirements taxonomy adapted to all context and systems because security requirements lacks a clear basic taxonomy. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Artif. Intell. Soft Comput. Res.

دوره 5  شماره 

صفحات  -

تاریخ انتشار 2015