Skip to main content

2017 | OriginalPaper | Buchkapitel

Selected Issues of Cyber Security Practices in CBRNeCy Critical Infrastructure

verfasst von : Stanislav Abaimov, Maurizio Martellini

Erschienen in: Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The article highlights the strong relevance and crucial importance of cyber security defence and response capacities in CBRNeCy assets and management, including in ICS and SCADA systems. Based on the overview of the recent cyber security publications and available information on global cybercrime, it reviews types of cyber and cyber related physical attacks on CBRN Industrial Control Systems; classifies attack types and defence techniques by network layer of attack; analyses security testing approaches based on knowledge of the targeted system, and evaluates types of due protection. The proper combination of existing physical security measures and cyber security testing exercises is considered, by the authors, as one of the most efficient ways to ensure sufficient protection against increasing global cyber threats to CBRNeCy infrastructures. The paper deals also with the best security practises, and contains enumeration of the globally recognized testing techniques and methodologies required to design effective multi-disciplinary security measures, thus providing a substantial ground for their practical implementation in the areas of concern.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
Report of the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security, 68th General Assembly, A/68/98, June 2013, pp. 8–11.
 
12
The publications by the following authors were the most relevant and considerably contributed to the present research: C. Baylon, I. Brown, R. Brunt, Fernandez, M. Martellini, K. Wilhoit. The same refers to the publications of the following organizations: Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), Institute of Electrical and Electronics (IEEE), Cornell University of Law.
 
14
IEEE 12th Symposium on Visualization for Cyber Security (VizSec 2015).
 
Literatur
1.
Zurück zum Zitat Bennett, S.: A Brief History of Automatic Control. IEEE (1996) Bennett, S.: A Brief History of Automatic Control. IEEE (1996)
2.
Zurück zum Zitat Boudriga, N.: Security of mobile communications. Boca Raton. CRC Press (2010) Boudriga, N.: Security of mobile communications. Boca Raton. CRC Press (2010)
3.
Zurück zum Zitat C. Baylon, R. D.: Cyber Security at Civil Nuclear Facilities,. Clatham House Report (2015) C. Baylon, R. D.: Cyber Security at Civil Nuclear Facilities,. Clatham House Report (2015)
4.
Zurück zum Zitat Chatham House: Emerging Risk Report – 2016, Use of Chemical, Biological, Radiological and Nuclear Weapons by Non-State Actors. Chatham House, The Royal Institute of International Affairs (2016) Chatham House: Emerging Risk Report – 2016, Use of Chemical, Biological, Radiological and Nuclear Weapons by Non-State Actors. Chatham House, The Royal Institute of International Affairs (2016)
6.
Zurück zum Zitat Fernandez, I.: Cybersecurity for Industrial Automation & Control Environments: Protection and Prevention Strategies in the Face of the Growing Threats. Frost & Sullivan (2013) Fernandez, I.: Cybersecurity for Industrial Automation & Control Environments: Protection and Prevention Strategies in the Face of the Growing Threats. Frost & Sullivan (2013)
7.
Zurück zum Zitat Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold (1988) Gasser, M.: Building a Secure Computer System. Van Nostrand Reinhold (1988)
8.
Zurück zum Zitat Hayden, E.: An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity. SANS Institute (2015) Hayden, E.: An Abbreviated History of Automation & Industrial Controls Systems and Cybersecurity. SANS Institute (2015)
9.
Zurück zum Zitat Hege Schultz Heireng, M. E.: THE DEVELOPMENT AND USE OF CBRN SCENARIOS FOR EMERGENCY PREPAREDNESS ANALYSES. FOI (2015) Hege Schultz Heireng, M. E.: THE DEVELOPMENT AND USE OF CBRN SCENARIOS FOR EMERGENCY PREPAREDNESS ANALYSES. FOI (2015)
10.
Zurück zum Zitat ICS-CERT: 10 Basic Cybersecurity Measure. US-CERT (2015) ICS-CERT: 10 Basic Cybersecurity Measure. US-CERT (2015)
12.
Zurück zum Zitat IEEE: IEEE Communications Surveys and Tutorials. IEEE (2012) IEEE: IEEE Communications Surveys and Tutorials. IEEE (2012)
13.
Zurück zum Zitat IEEE Communications Surveys & Tutorials: Introduction to Industrial Control Networks. IEEE (2013) IEEE Communications Surveys & Tutorials: Introduction to Industrial Control Networks. IEEE (2013)
14.
Zurück zum Zitat Martellini, M.: Deterrence and IT Protection for Critical Infrastructures. Springer (2013) Martellini, M.: Deterrence and IT Protection for Critical Infrastructures. Springer (2013)
15.
Zurück zum Zitat NIST: Guide to Intrusion Detection and Prevention Systems. NIST (2007) NIST: Guide to Intrusion Detection and Prevention Systems. NIST (2007)
16.
Zurück zum Zitat NIST: Technical Guide to the Information Security Testing and Assessment. National Institute of Standards and Technology Special Publication (2008) NIST: Technical Guide to the Information Security Testing and Assessment. National Institute of Standards and Technology Special Publication (2008)
17.
Zurück zum Zitat Paske, E. L.: Cyber Security of Industrial Control Systems, Global Conference on Cyber Space (2015) Paske, E. L.: Cyber Security of Industrial Control Systems, Global Conference on Cyber Space (2015)
18.
Zurück zum Zitat Stout, T. M., & Williams, T. J.: Pioneering Work in the Field of Computer Process Control. IEEE Annals of the History of Computing (1995) Stout, T. M., & Williams, T. J.: Pioneering Work in the Field of Computer Process Control. IEEE Annals of the History of Computing (1995)
19.
Zurück zum Zitat US Department of State: Cyber Security for Nuclear Power Plants. Washington: US Department of State (2012) US Department of State: Cyber Security for Nuclear Power Plants. Washington: US Department of State (2012)
20.
Zurück zum Zitat Vanessa Romero Segovia, A. T.: History of PLC and DCS (2012) Vanessa Romero Segovia, A. T.: History of PLC and DCS (2012)
21.
Zurück zum Zitat Verizon: Data Breach digest. Scenarios from the field. Verizon (2016) Verizon: Data Breach digest. Scenarios from the field. Verizon (2016)
22.
Zurück zum Zitat Wamala, F.: National Cybersecurity Strategy Guide. International Telecommunication Union (2011) Wamala, F.: National Cybersecurity Strategy Guide. International Telecommunication Union (2011)
23.
Zurück zum Zitat Wilson, C.: Cyberpower and National Security (2009) Wilson, C.: Cyberpower and National Security (2009)
24.
Zurück zum Zitat Wilson, C.: Cyberterrorism: Understanding, Assessment, and Response. Swansea University (2014) Wilson, C.: Cyberterrorism: Understanding, Assessment, and Response. Swansea University (2014)
Metadaten
Titel
Selected Issues of Cyber Security Practices in CBRNeCy Critical Infrastructure
verfasst von
Stanislav Abaimov
Maurizio Martellini
Copyright-Jahr
2017
DOI
https://doi.org/10.1007/978-3-319-62108-1_2