A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva*, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart

*Awdur cyfatebol y gwaith hwn

Allbwn ymchwil: Cyfraniad at gyfnodolynErthygl adolyguadolygiad gan gymheiriaid

8 Dyfyniadau (Scopus)
722 Wedi eu Llwytho i Lawr (Pure)

Crynodeb

This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation and tool support. Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. We also outline five research challenges facing the domain and point out the approaches that might be taken.

Iaith wreiddiolSaesneg
Tudalennau (o-i)1-27
Nifer y tudalennau27
CyfnodolynComputers and Security
Cyfrol56
Dyddiad ar-lein cynnar13 Hyd 2015
Dynodwyr Gwrthrych Digidol (DOIs)
StatwsCyhoeddwyd - 1 Chwef 2016

Ôl bys

Gweld gwybodaeth am bynciau ymchwil 'A review of cyber security risk assessment methods for SCADA systems'. Gyda’i gilydd, maen nhw’n ffurfio ôl bys unigryw.

Dyfynnu hyn