A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model - ICT Systems Security and Privacy Protection (SEC 2014) Access content directly
Conference Papers Year : 2014

A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model

Theodoros Spyridopoulos
  • Function : Author
  • PersonId : 986208
Ioanna-Aikaterini Topa
  • Function : Author
  • PersonId : 989433
Theo Tryfonas
  • Function : Author
  • PersonId : 986210
Maria Karyda
  • Function : Author
  • PersonId : 989434

Abstract

Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importance such as energy production and distribution, transportation, telecoms etc. Protection of such systems is the cornerstone of essential service provision with resilience and in timely manner. Effective risk management methods form the basis for the protection of an Industrial Control System. However, the nature of ICSs render traditional risk management methods insufficient. The proprietary character and the complex interrelationships of the various systems that form an ICS, the potential impacts outside its boundaries, along with emerging trends such as the exposure to the Internet, necessitate revisiting traditional risk management methods, in a way that treat an ICS as a system-of-systems rather than a single, one-off entity. Towards this direction, in this paper we present enhancements to the traditional risk management methods at the phase of risk assessment, by utilising the cybernetic construct of the Viable System Model (VSM) as a means towards a holistic view of the risks against Critical Infrastructure. For the purposes of our research, utilising VSM’s recursive nature, we model the Supervisory Control and Data Acquisition (SCADA) system, a most commonly used ICS, as a VSM and identify the various assets, interactions with the internal and external environment, threats and vulnerabilities.
Fichier principal
Vignette du fichier
978-3-642-55415-5_37_Chapter.pdf (4 Ko) Télécharger le fichier
Origin : Files produced by the author(s)
Loading...

Dates and versions

hal-01370393 , version 1 (22-09-2016)

Licence

Attribution

Identifiers

Cite

Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda. A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. 29th IFIP International Information Security Conference (SEC), Jun 2014, Marrakech, Morocco. pp.438-445, ⟨10.1007/978-3-642-55415-5_37⟩. ⟨hal-01370393⟩
46 View
148 Download

Altmetric

Share

Gmail Facebook X LinkedIn More