"How Long is a Piece of String":
- 3 November 2017
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 2017 Workshop on Adaptive Resource Management and Scheduling for Cloud Computing - ARMS-CC '17
Abstract
The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall processKeywords
This publication has 6 references indexed in Scilit:
- Achieving ICS Resilience and Security through Granular Data Flow ManagementPublished by Association for Computing Machinery (ACM) ,2016
- A review of cyber security risk assessment methods for SCADA systemsComputers & Security, 2016
- The Impact of Social Engineering on Industrial Control System SecurityPublished by Association for Computing Machinery (ACM) ,2015
- A survey of cyber security management in industrial control systemsInternational Journal of Critical Infrastructure Protection, 2015
- Interviewing for Social ScientistsPublished by SAGE Publications ,1999
- The Long InterviewPublished by SAGE Publications ,1988