"How Long is a Piece of String":

Abstract
The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process

This publication has 6 references indexed in Scilit: