Abstract
This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation of trust cases which provide valuable information for the end users of the infrastructure. Another new proposal is MAlSim - mobile agent-based simulator of malicious software (viruses, worms, etc). To the best of the authors' knowledge, such a simulator has not been proposed before. The present approach was applied to the verification of the security of industrial control systems and power plants. In the study, one of the experiments related to the security study of an information system of a power plant, a simulation of zero-day worm attack, is described.
Citations
-
1 3
CrossRef
-
0
Web of Science
-
2 0
Scopus
Authors (3)
Cite as
Full text
- Publication version
- Accepted or Published Version
- DOI:
- Digital Object Identifier (open in new tab) 10.1049/iet-ifs.2010.0261
- License
- Copyright (2011 The Institution of Engineering and Technology)
Keywords
Details
- Category:
- Articles
- Type:
- artykuł w czasopiśmie wyróżnionym w JCR
- Published in:
-
IET Information Security
no. 5,
pages 135 - 144,
ISSN: 1751-8709 - Language:
- English
- Publication year:
- 2011
- Bibliographic description:
- Leszczyna R., Nai Fovino I., Masera M.: Approach to security assessment of critical infrastructures' information systems // IET Information Security. -Vol. 5, nr. Iss 3 (2011), s.135-144
- DOI:
- Digital Object Identifier (open in new tab) 10.1049/iet-ifs.2010.0261
- Verified by:
- Gdańsk University of Technology
seen 116 times