A Security test and evaluation model for electric industrial control systems

被引:0
|
作者
Jiang, Chengzhi [1 ]
Liu, Tingting
Bao, Xingchuan [1 ]
机构
[1] China Elect Power Res Inst, Nanjing 211106, Jiangsu, Peoples R China
来源
COMPUTER AND INFORMATION TECHNOLOGY | 2014年 / 519-520卷
关键词
security evaluation; security test; industrial control system; NETWORKS;
D O I
10.4028/www.scientific.net/AMM.519-520.1385
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The adoption of Information and Communication Technologies (ICTs) in critical infrastructures, e.g. smart grids and power plants, facilitates the interoperation between components but introduces new security issues as well. Based on the survey of typical Industrial Control Systems (ICSs) in the power grid corporation, a three-layer abstract model of electric ICS is built in this paper. A corresponding security test and evaluation model is then proposed and detailed steps, components and methods involved are described. The proposed model can be considered to be the guide to carry out security test and evaluation activities so as to enforce the security protection of ICS in electric industry.
引用
收藏
页码:1385 / +
页数:2
相关论文
共 50 条
  • [21] Security Threat and Protection in Industrial Control System
    Jiang, Yixiang
    Zhang, Chengting
    CLOUD COMPUTING AND SECURITY, PT VI, 2018, 11068 : 49 - 58
  • [22] Industrial Control System Security Framework for Ethiopia
    Berhe, Abraham Belay
    Tizazu, Gebere Akele
    Kim, Ki-Hyung
    2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 814 - 817
  • [23] A Novel Security Evaluation Model for E-government Intranet Systems
    Jin, Xiaoting
    ADVANCES IN ELECTRONIC COMMERCE, WEB APPLICATION AND COMMUNICATION, VOL 2, 2012, 149 : 297 - 302
  • [24] Developing Cybersecurity Systems Based on Machine Learning and Deep Learning Algorithms for Protecting Food Security Systems: Industrial Control Systems
    Alkahtani, Hasan
    Aldhyani, Theyazn H. H.
    ELECTRONICS, 2022, 11 (11)
  • [25] A Security Evaluation Model for Edge Information Systems Based on Index Screening
    Guo, Ziyu
    Qi, Jiahao
    Zuo, Jinxin
    Xie, Weixuan
    Lu, Yueming
    Tian, Huiping
    Cao, Ruohan
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 21585 - 21603
  • [26] A Study on Performance Evaluation for Security Test Laboratory
    Seo, Ji-Yong
    Chang, Hangbae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (01): : 163 - 168
  • [27] A Heterogeneous Redundant Architecture for Industrial Control System Security
    Dai, Zhihao
    Leeke, Matthew
    Ding, Yulong
    Yang, Shuang-Hua
    2022 IEEE 27TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC), 2022, : 89 - 97
  • [28] A Survey on SCADA Security and Honeypot in Industrial Control System
    Lu, Kuan-Chu
    Liu, I-Hsien
    Sun, Meng-Wei
    Li, Jung-Shian
    RECENT TRENDS IN DATA SCIENCE AND SOFT COMPUTING, IRICT 2018, 2019, 843 : 598 - 604
  • [29] Cyber Security Password Policy for Industrial Control Networks
    Sarkar, Sajal
    Sarkar, Sudip
    Sarkar, Kajal
    Ghosh, Soumalya
    2015 1ST INTERNATIONAL CONFERENCE ON NEXT GENERATION COMPUTING TECHNOLOGIES (NGCT), 2015, : 408 - 413
  • [30] Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network Approach
    Bhosale, Pushparaj
    Kastner, Wolfgang
    Sauter, Thilo
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,