Home > Research > Publications & Outputs > "How Long is a Piece of String"

Electronic data

  • sample-sigconf

    Rights statement: © ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251

    Accepted author manuscript, 441 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

"How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

"How Long is a Piece of String" : Defining Key Phases and Observed Challenges within ICS Risk Assessment. / Green, Benjamin; Prince, Daniel David Campbell; Busby, Jeremy Simon; Hutchison, David.

CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York : ACM, 2017. p. 103-109.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Green, B, Prince, DDC, Busby, JS & Hutchison, D 2017, "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment. in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. ACM, New York, pp. 103-109, CPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy, Dallas, United States, 3/11/17. https://doi.org/10.1145/3140241.3140251

APA

Green, B., Prince, D. D. C., Busby, J. S., & Hutchison, D. (2017). "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment. In CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy (pp. 103-109). ACM. https://doi.org/10.1145/3140241.3140251

Vancouver

Green B, Prince DDC, Busby JS, Hutchison D. "How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment. In CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York: ACM. 2017. p. 103-109 https://doi.org/10.1145/3140241.3140251

Author

Green, Benjamin ; Prince, Daniel David Campbell ; Busby, Jeremy Simon ; Hutchison, David. / "How Long is a Piece of String" : Defining Key Phases and Observed Challenges within ICS Risk Assessment. CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy. New York : ACM, 2017. pp. 103-109

Bibtex

@inproceedings{ca2e80167130406f9c85e5604223f4fb,
title = "{"}How Long is a Piece of String{"}: Defining Key Phases and Observed Challenges within ICS Risk Assessment",
abstract = "The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.",
keywords = "Industrial Control Systems, ICS, SCADA, OT, Cyber Security, Risk Assessment",
author = "Benjamin Green and Prince, {Daniel David Campbell} and Busby, {Jeremy Simon} and David Hutchison",
note = "{\textcopyright} ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251; CPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy ; Conference date: 03-11-2017 Through 03-11-2017",
year = "2017",
month = nov,
day = "3",
doi = "10.1145/3140241.3140251",
language = "English",
isbn = "9781450353946",
pages = "103--109",
booktitle = "CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy",
publisher = "ACM",
url = "https://sites.google.com/site/cpsspc2017/",

}

RIS

TY - GEN

T1 - "How Long is a Piece of String"

T2 - CPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy

AU - Green, Benjamin

AU - Prince, Daniel David Campbell

AU - Busby, Jeremy Simon

AU - Hutchison, David

N1 - © ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251

PY - 2017/11/3

Y1 - 2017/11/3

N2 - The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.

AB - The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.

KW - Industrial Control Systems

KW - ICS

KW - SCADA

KW - OT

KW - Cyber Security

KW - Risk Assessment

U2 - 10.1145/3140241.3140251

DO - 10.1145/3140241.3140251

M3 - Conference contribution/Paper

SN - 9781450353946

SP - 103

EP - 109

BT - CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy

PB - ACM

CY - New York

Y2 - 3 November 2017 through 3 November 2017

ER -