Home > Research > Publications & Outputs > "How Long is a Piece of String"

Electronic data

  • sample-sigconf

    Rights statement: © ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251

    Accepted author manuscript, 441 KB, PDF document

    Available under license: CC BY-NC: Creative Commons Attribution-NonCommercial 4.0 International License

Links

Text available via DOI:

View graph of relations

"How Long is a Piece of String": Defining Key Phases and Observed Challenges within ICS Risk Assessment

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published
Publication date3/11/2017
Host publicationCPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy
Place of PublicationNew York
PublisherACM
Pages103-109
Number of pages7
ISBN (print)9781450353946
<mark>Original language</mark>English
EventCPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy - Hotel Sheraton Downtown Dallas, Dallas, United States
Duration: 3/11/20173/11/2017
https://sites.google.com/site/cpsspc2017/

Workshop

WorkshopCPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy
Country/TerritoryUnited States
CityDallas
Period3/11/173/11/17
Internet address

Workshop

WorkshopCPS-SPC '17 Proceedings of the 3rd ACM Workshop on Cyber-Physical Systems Security and Privacy
Country/TerritoryUnited States
CityDallas
Period3/11/173/11/17
Internet address

Abstract

The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also signi cant e orts to improve defensive capabilities. While comprehensive reviews of risk assessment e orts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing prede ned methodologies, and challenges faced throughout the overall process.

Bibliographic note

© ACM, 2017. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. The definitive Version of Record was published in CPS '17 Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy http://dx.doi.org/10.1145/3140241.3140251