3D modeling of selected assets, security zones and conduits

نویسندگان

  • Simon Seibt
  • Karl Waedt
  • Hans Delfs
  • Simon Odorfer
چکیده

Current critical industrial infrastructure (CII) which uses industrial automation and control systems (IACS) can be a target of cyber-attacks or combined cyber-physical attacks. To ensure the security of the CII, international standards are gradually evolving. The IEC 62443-x-x series is a specialized multipart security standard for IACS. It introduces, among others, the concept of security zones and security conduits [IE09]. The security zones can be defined in a physical sense and for logical grouping. By applying the defense-in-depth concept, both definitions are relevant. The development of a realistic three-dimensional (3D) model of CII can support the subdivision for the zoning and further security analyses. The model includes the locations of security relevant physical assets, which can be grouped into security zones and linked with related security artefacts. By using a 3D model, all relevant two-dimensional views can be derived. This paper addresses the use of a 3D model to support the application of security controls and risk assessments in line with concepts elaborated by IEC 62443-4-2 [IE15].

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3D stochastic rock fracture modeling related to strike-slip faults

Fault zones and fault-related fracture systems control the mechanical behaviors and fluid-flow properties of the Earth’s crust. Furthermore, nowadays, modeling is being increasingly used in order to understand the behavior of rock masses, and to determine their characteristics. In this work, fault zones and fracture patterns are reviewed, and also comprehensive studies are carried out on the fr...

متن کامل

Geostatistical and multi-fractal modeling of geological and geophysical characteristics in Ghalandar Skarn-Porphyry Cu Deposit, Iran

This work aims at figuring out the spatial relationships between the geophysical and geological models in a case study pertaining to copper-sulfide mineralization through an integrated 3D analysis of favorable target. The Ghalandar Skarn-Porphyry Cu Deposit, which is located in NW Iran, is selected for this research work. Three geophysical surveys of direct current electrical resistivity and in...

متن کامل

Delineation of alteration zones based on kriging, artificial neural networks, and concentration–volume fractal modelings in hypogene zone of Miduk porphyry copper deposit, SE Iran

This paper presents a quantitative modeling for delineating alteration zones in the hypogene zone of the Miduk porphyry copper deposit (SE Iran) based on the core drilling data. The main goal of this work was to apply the Ordinary Kriging (OK), Artificial Neural Networks (ANNs), and Concentration-Volume (C-V) fractal modelings on Cu grades to separate different alteration zones. Anisotropy was ...

متن کامل

Application of fractal modeling to delineate alteration zones and lithological units in Masjed-Daghi Cu-Au porphyry deposit, NW Iran

In this paper, we aim to present a quantitative modeling for delineating the alteration zones and lithological units in the hypogene zone of Masjed-Daghi Cu-Au porphyry deposit (NW Iran) based on the drill core data. The main goal of this work is to apply Ordinary Kriging (OK) and concentration-volume (C-V) fractal model based on Cu grades in order to separate the different alteration zones and...

متن کامل

Information Security Investment Strategies in Supply Chain Firms: Interplay Between Breach Propagation, Shared Information Assets and Chain Topology

Firms in a supply chain share information assets among them, and make use of inter-firm network connections to enable quick information sharing. Both of these approaches have significant implications when a security breach occurs. One, the interconnections may become conduits for security breach propagation. Two, shared information assets now become vulnerable at the owner as well as at the par...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016