Please use this identifier to cite or link to this item:
http://hdl.handle.net/10125/71455
Cybersecurity Risk Assessment Framework for Externally Exposed Energy Delivery Systems
Item Summary
Title: | Cybersecurity Risk Assessment Framework for Externally Exposed Energy Delivery Systems |
Authors: | Gourisetti, Sri Nikhil Gupta Touhiduzzaman, Md Ashley, Travis Pal, Seemita Mckenzie, Penny |
Keywords: | Cyber Operations, Defence, and Forensics cyberse-curity energy delivery systems industrial control systems operational technology show 2 moreotcybersecurity web spiders show less |
Date Issued: | 05 Jan 2021 |
Abstract: | Securing the energy delivery system (EDS) from complex, nonlinear, and evolving cyber threats requires a complex set of changing and interwoven classes of technologies, policies, relationships, and personnel. One key area in this technological milieu is assessment methodologies to compare information, gathered by a variety of means, about networked devices with publicly known possible threat information about said devices. This information is used to generate risk-based characterizations that allow for the adjudication and proper corresponding management action chains to be assigned. \color{blue}To address the current cybersecurity needs in the operational technology (OT) domain, we developed a novel relative-risk assessment framework and a software application called MEEDS that can detect exposed OT systems. This paper presents the detailed architecture of relative-risk assessment framework methodology and its integral role in the MEEDS software. The efficacy of the presented framework is demonstrated by testing with the real-world systems and vulnerabilities pertaining to the industrial control systems (ICS) in critical infrastructures. |
Pages/Duration: | 9 pages |
URI: | http://hdl.handle.net/10125/71455 |
ISBN: | 978-0-9981331-4-0 |
DOI: | 10.24251/HICSS.2021.834 |
Rights: | Attribution-NonCommercial-NoDerivatives 4.0 International https://creativecommons.org/licenses/by-nc-nd/4.0/ |
Appears in Collections: |
Cyber Operations, Defence, and Forensics |
Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.
This item is licensed under a Creative Commons License