Concepts to Analyze the Vulnerability of Critical Infrastructures - Taking into account Cybernetics

نویسندگان

  • Frédéric PETIT
  • Benoît Robert
چکیده

Critical Infrastructures (CIs) are complex systems. For their operations, these infrastructures are increasingly using Supervisory Control And Data Acquisition (SCADA) systems. Management practices are therefore highly dependent on the cyber tools, but also on the data needed to make these tools work. Therefore, CIs are greatly vulnerable to degradation of data. In this context, this paper aims at presenting the fundamentals of a method for analyzing the vulnerabilities of CIs towards the use of cyber data. By characterizing cyber vulnerability of CIs, it will be possible to improve the resilience of these networks and to foster a proactive approach to risk management not only by considering cybernetics from a cyber-attack point of view but also by considering the consequences of the use of corrupted data.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Region sown areas portfolio optimization taking into account crop production economic risk

Grain production is one of the Ukrainian agro-industrial complex main branches. An indicator of the grain production efficiency is its profitability. It is characterized by significant annual fluctuations that induce risk. Redistribution of existing grain crops areas taking into consideration their profitability can bring to increase of production efficiency. The paper observes Markowitz’s opti...

متن کامل

Future Studies of Political Crises resulted by Tehran's probable Earthquake [Vulnerability of information infrastructure and the probability of occurrence of crises of efficiency and influence]

INTRODUCTION: The density of the country’s information infrastructure in Tehran, Iran, and the high vulnerability of these infrastructures raise the question of what effects the demolition of these infrastructures would have. Natural disaster management is entirely dependent on the capacity and efficiency of the central government in Iran and the government also mobilizes and organizes cris...

متن کامل

Effective Factors on Knowledge Sharing among Faculty Members: Ardabil University of Medical Sciences

Introduction: Several factors have contributed to the creation and development of knowledge sharing culture. Awareness of these factors and their impact on knowledge sharing seems to be vital for educational organizations. This study was conducted with the aim of determining the factors affecting sharing knowledge among faculty members of Ardabil University of Medical Sciences. Methods: This st...

متن کامل

Complex Risk Analysis of Investing in Agriculture ETFs

The aim of the paper is to present a complex risk analysis of investing in agriculture Exchange Trade Funds (ETFs). The specific characteristics of agricultural investments should be taken into account as from the direct financial investments into agricultural ETFs, as for the general portfolio approach applying. To achieve the objectives of the work, the authors structured agriculture ETFs int...

متن کامل

Algebraic Matching of Vulnerabilities in a Low-Level Code

This paper explores the algebraic matching approach for detection of vulnerabilities in binary codes. The algebraic programming system is used for implementing this method. It is anticipated that models of vulnerabilities and programs to be verified are presented as behavior algebra and action language specifications. The methods of algebraic matching are based on rewriting rules and techniques...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013