Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/71455

Cybersecurity Risk Assessment Framework for Externally Exposed Energy Delivery Systems

File Size Format  
0678.pdf 1.7 MB Adobe PDF View/Open

Item Summary

Title:Cybersecurity Risk Assessment Framework for Externally Exposed Energy Delivery Systems
Authors:Gourisetti, Sri Nikhil Gupta
Touhiduzzaman, Md
Ashley, Travis
Pal, Seemita
Mckenzie, Penny
Keywords:Cyber Operations, Defence, and Forensics
cyberse-curity
energy delivery systems
industrial control systems
operational technology
show 2 moreotcybersecurity
web spiders
show less
Date Issued:05 Jan 2021
Abstract:Securing the energy delivery system (EDS) from complex, nonlinear, and evolving cyber threats requires a complex set of changing and interwoven classes of technologies, policies, relationships, and personnel. One key area in this technological milieu is assessment methodologies to compare information, gathered by a variety of means, about networked devices with publicly known possible threat information about said devices. This information is used to generate risk-based characterizations that allow for the adjudication and proper corresponding management action chains to be assigned. \color{blue}To address the current cybersecurity needs in the operational technology (OT) domain, we developed a novel relative-risk assessment framework and a software application called MEEDS that can detect exposed OT systems. This paper presents the detailed architecture of relative-risk assessment framework methodology and its integral role in the MEEDS software. The efficacy of the presented framework is demonstrated by testing with the real-world systems and vulnerabilities pertaining to the industrial control systems (ICS) in critical infrastructures.
Pages/Duration:9 pages
URI:http://hdl.handle.net/10125/71455
ISBN:978-0-9981331-4-0
DOI:10.24251/HICSS.2021.834
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Cyber Operations, Defence, and Forensics


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons