A Process for the Identification of Security Risks from Critical Infrastructure Interdependencies

نویسندگان

  • P. BERAUD
  • A. AHMAD
چکیده

Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex interdependencies between the critical infrastructures. To support this proposition, this paper conducts a systematic analysis of the security risks resulting from logical, cyber, geographical and physical interdependencies between telecommunications and power infrastructures. The analysis demonstrates that certain security risks arising from interdependencies cannot be identified using the traditional risk identification approach. A process model is then proposed to extend existing risk methodologies to include a systematic identification of the security risks that arise from the interdependencies of infrastructures.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions

Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...

متن کامل

Analyzing security risks in critical infrastructures embedded in systems of systems: How to capture the impact of interdependencies

Our economy and national well-being is highly dependent on Critical Infrastructures (CIs). Today, CIs rely heavily on ICT and are often embedded within systems of systems. This makes CIs particularly vulnerable to security threats. In this paper we address the methodological challenge of how to estimate the impact that interdependencies within a System of Systems (SoS) have on the overall secur...

متن کامل

IEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification

Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...

متن کامل

Modeling Inoperability Propagation Using Bayesian Networks

The modeling of critical infrastructure interdependencies is a challenging task. This paper discusses several interdependency modeling requirements and proposes a Bayesian network approach for modeling interdependencies and inoperability propagation. The approach is applied to a case study involving the Japanese critical infrastructure sectors. Survey data published by the National Institute of...

متن کامل

Chapter 14 MODELING INOPERABILITY PROPAGATION USING BAYESIAN NETWORKS

The modeling of critical infrastructure interdependencies is a challenging task. This paper discusses several interdependency modeling requirements and proposes a Bayesian network approach for modeling interdependencies and inoperability propagation. The approach is applied to a case study involving the Japanese critical infrastructure sectors. Survey data published by the National Institute of...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013