Rights statement: © ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251
Accepted author manuscript, 441 KB, PDF document
Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License
Final published version
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSN › Conference contribution/Paper › peer-review
}
TY - GEN
T1 - "How Long is a Piece of String"
T2 - CPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy
AU - Green, Benjamin
AU - Prince, Daniel David Campbell
AU - Busby, Jeremy Simon
AU - Hutchison, David
N1 - © ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251
PY - 2017/11/3
Y1 - 2017/11/3
N2 - The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.
AB - The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.
KW - Industrial Control Systems
KW - ICS
KW - SCADA
KW - OT
KW - Cyber Security
KW - Risk Assessment
U2 - 10.1145/3140241.3140251
DO - 10.1145/3140241.3140251
M3 - Conference contribution/Paper
SN - 9781450353946
SP - 103
EP - 109
BT - CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy
PB - ACM
CY - New York
Y2 - 3 November 2017 through 3 November 2017
ER -