Critical review of cybersecurity protection procedures and practice in water distribution systems

نویسنده

  • Vikram M. Rao
چکیده

The objective of this paper is to conduct a critical review of cybersecurity procedures and practices in the water distribution sector. Specifically, this paper provides a characterization of the current state of cybersecurity practice and risk management in drinking water systems. This characterization is critically important due to the number of cyber attacks that have occurred against water systems recently. While organizations such as AWWA (American Water Works Association) have provided guidelines for implementing cybersecurity measures, limited formal research is being done in the field of risk analysis to assess the nature and impact of risks, and ways to mitigate them. Our work illuminates areas of concern: lack of detailed risk guidance and decision making strategies, and a need for a cost-benefit analysis to be performed. Addressing these will allow future research to address risks and decision making strategies. We believe this characterization is the next step towards developing a comprehensive risk assessment methodology that can identify cyber vulnerabilities and prioritize cyber measures in drinking water systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Study on Microbiological Quality of Rural and Urban Drinking Water in Distribution Systems of Ijroud, Zanjan in 2013-2015

Background: Providing safe drinking water has critical importance to human societies. The aim of this study was to investigate microbiological quality of drinking water in distribution system of urban and rural regions of Ijroud, in Zanjan province.   Materials and Methods: In present descriptive study, the microbiological examination of drinking water was conducted in 15 facilities with...

متن کامل

The challenges and recommended steps to improve cyber security within industrial control systems

“Security Protection against attack, Safety Freedom from risk and harm” End users or operators of industrial control systems (ICS) are responsible for the security of the systems. Many end users, however, find a challenge in addressing simple issues, typically: What requires protection from cyberattacks and how much protection is required? Will a critical system disruption or cyber theft cause ...

متن کامل

Optimization of Radiological Protection in Pediatric Patients Undergoing Common Conventional Radiological Procedures: Effectiveness of Increasing the Film to Focus Distance (FFD)

Background Increasing the x-ray film to focus distance (FFD), has been recommended as a practical dose optimization tool for patients undergoing conventional radiological procedures. In the previous study, we demonstrated a 32% reduction in absorbed dose is achievable due to increasing the FFD from 100 to 130 cm during pediatric chest radiography. The aim of this study was to examine whether in...

متن کامل

An Evaluation of Security Posture Assessment Tools on a SCADA Environment

Increased concerns for energy grid cybersecurity has lead to the development of compliance requirements that must be evaluated by utilities. The North American Electric Reliability Council (NERC) has created Critical Infrastructure Protection (CIP) requirements for all cyber assets supporting the bulk energy system [17]. This research explores whether the methodologies and tools commonly used f...

متن کامل

Cybersecurity Issues and Challenges: In Brief

The information and communications technology (ICT) industry has evolved greatly over the last half century. The technology is ubiquitous and increasingly integral to almost every facet of modern society. ICT devices and components are generally interdependent, and disruption of one may affect many others. Over the past several years, experts and policy makers have expressed increasing concerns...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015