Subject: Law | Computer Science(all) | QA75 | QA76
This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We descr... View more
Beggs and Warren (2009); Chittester and Haimes (2004); Francia et al.
(2012); Guan et al. (2011); Henry et al.
(2009); Permann and Rohde (2005); Song et al. (2012)
Cardenas et al. (2011); Roy et al. (2010); Yan et al. (2013); Yu et al. (2006) Baiardi et al. (2009); Markovic-Petrovic and Stojanovic (2014); Ten et al. (2010) Byres et al. (2004); Kriaa et al. (2012); LeMay et al. (2010); McQueen et al.
(2006); Patel and Zaveri (2010) Gertman et al. (2006); Henry and Haimes (2009); Hewett et al. (2014); Patel et al. (2008); Woo and Kim (2014) Byres E, Leversage D, Kube N. Security incidents and trends in SCADA and process industries. In: The industrial ethernet book, vol. 39. 2007. p. 12-20.
Cabinet Office. Strategic framework and policy statement on improving the resilience of critical infrastructure to disruption from natural hazards. 2010.
Campbell P, Stamp J. A classification scheme for risk assessment methods. Sandia National Laboratory; 2004 SAND2004-4233.
Cardenas A, Amin S, Lin Z, Huang Y, Huang C, Sastry S. Attacks against process control systems: risk assessment, detection, and response. In: Proceedings of the 6th ACM symposium on information, computer and communications security. ACM; 2011. p. 355-66.
Cheminod M, Durante L, Valenzano A. Review of security issues in industrial networks. IEEE Trans Industr Inform 2013;9(1):277-93.
Chittester C, Haimes YY. Risks of terrorism to information technology and to critical interdependent infrastructures. J Homel Secur Emerg Manag 2004;1(4):article 402.