Cardiff University | Prifysgol Caerdydd ORCA
Online Research @ Cardiff 
WelshClear Cookie - decide language by browser settings

A holistic approach for cyber assurance of critical infrastructure with the viable system model

Spyridopoulos, Theodoros ORCID: https://orcid.org/0000-0001-7575-9909, Topa, Ioanna-Aikaterini, Tryfonas, Theo and Karyda, Maria 2014. A holistic approach for cyber assurance of critical infrastructure with the viable system model. Presented at: 29th IFIP TC 11 International Conference, Marrakesh, Morocco, 2nd-4th June 2014. ICT Systems Security and Privacy Protection. IFIP Advances in Information and Communication Technology , vol.428 pp. 438-445. 10.1007/978-3-642-55415-5_37

Full text not available from this repository.

Abstract

Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importance such as energy production and distribution, transportation, telecoms etc. Protection of such systems is the cornerstone of essential service provision with resilience and in timely manner. Effective risk management methods form the basis for the protection of an Industrial Control System. However, the nature of ICSs render traditional risk management methods insufficient. The proprietary character and the complex interrelationships of the various systems that form an ICS, the potential impacts outside its boundaries, along with emerging trends such as the exposure to the Internet, necessitate revisiting traditional risk management methods, in a way that treat an ICS as a system-of-systems rather than a single, one-off entity. Towards this direction, in this paper we present enhancements to the traditional risk management methods at the phase of risk assessment, by utilising the cybernetic construct of the Viable System Model (VSM) as a means towards a holistic view of the risks against Critical Infrastructure. For the purposes of our research, utilising VSM’s recursive nature, we model the Supervisory Control and Data Acquisition (SCADA) system, a most commonly used ICS, as a VSM and identify the various assets, interactions with the internal and external environment, threats and vulnerabilities.

Item Type: Conference or Workshop Item (Paper)
Status: Published
Schools: Computer Science & Informatics
ISBN: 978-364255414-8
Last Modified: 30 Jan 2023 11:30
URI: https://orca.cardiff.ac.uk/id/eprint/153618

Actions (repository staff only)

Edit Item Edit Item