A Process for the Identification of Security Risks from Critical Infrastructure Interdependencies
نویسندگان
چکیده
Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex interdependencies between the critical infrastructures. To support this proposition, this paper conducts a systematic analysis of the security risks resulting from logical, cyber, geographical and physical interdependencies between telecommunications and power infrastructures. The analysis demonstrates that certain security risks arising from interdependencies cannot be identified using the traditional risk identification approach. A process model is then proposed to extend existing risk methodologies to include a systematic identification of the security risks that arise from the interdependencies of infrastructures.
منابع مشابه
A survey on impact of cloud computing security challenges on NFV infrastructure and risks mitigation solutions
Increased broadband data rate for end users and the cost of resource provisioning to an agreed SLA in telecom service providers, are forcing operators in order to adhere to employment Virtual Network Functions (VNF) in an NFV solution. The newly 5G mobile telecom technology is also based on NFV and Software Define Network (SDN) which inherit opportunities and threats of such constructs. Thus a ...
متن کاملAnalyzing security risks in critical infrastructures embedded in systems of systems: How to capture the impact of interdependencies
Our economy and national well-being is highly dependent on Critical Infrastructures (CIs). Today, CIs rely heavily on ICT and are often embedded within systems of systems. This makes CIs particularly vulnerable to security threats. In this paper we address the methodological challenge of how to estimate the impact that interdependencies within a System of Systems (SoS) have on the overall secur...
متن کاملIEC 60870-5-104 Protocol Security Challenges and Countermeasures Identification
Industrial control systems (ICSs) which are used in critical infrastructure and other industries mostly use various communication protocols. Most of these communication protocols have various cyber security challenges and weakness that give the attackers the opportunity to gain to their malicious intentions. In this paper, we assess IEC 60870-5-104 protocols from security perspective which is u...
متن کاملModeling Inoperability Propagation Using Bayesian Networks
The modeling of critical infrastructure interdependencies is a challenging task. This paper discusses several interdependency modeling requirements and proposes a Bayesian network approach for modeling interdependencies and inoperability propagation. The approach is applied to a case study involving the Japanese critical infrastructure sectors. Survey data published by the National Institute of...
متن کاملChapter 14 MODELING INOPERABILITY PROPAGATION USING BAYESIAN NETWORKS
The modeling of critical infrastructure interdependencies is a challenging task. This paper discusses several interdependency modeling requirements and proposes a Bayesian network approach for modeling interdependencies and inoperability propagation. The approach is applied to a case study involving the Japanese critical infrastructure sectors. Survey data published by the National Institute of...
متن کامل