Approach to security assessment of critical infrastructures' information systems - Publication - Bridge of Knowledge

Search

Approach to security assessment of critical infrastructures' information systems

Abstract

This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation of trust cases which provide valuable information for the end users of the infrastructure. Another new proposal is MAlSim - mobile agent-based simulator of malicious software (viruses, worms, etc). To the best of the authors' knowledge, such a simulator has not been proposed before. The present approach was applied to the verification of the security of industrial control systems and power plants. In the study, one of the experiments related to the security study of an information system of a power plant, a simulation of zero-day worm attack, is described.

Citations

  • 1 3

    CrossRef

  • 0

    Web of Science

  • 2 0

    Scopus

Cite as

Full text

download paper
downloaded 11 times
Publication version
Accepted or Published Version
DOI:
Digital Object Identifier (open in new tab) 10.1049/iet-ifs.2010.0261
License
Copyright (2011 The Institution of Engineering and Technology)

Keywords

Details

Category:
Articles
Type:
artykuł w czasopiśmie wyróżnionym w JCR
Published in:
IET Information Security no. 5, pages 135 - 144,
ISSN: 1751-8709
Language:
English
Publication year:
2011
Bibliographic description:
Leszczyna R., Nai Fovino I., Masera M.: Approach to security assessment of critical infrastructures' information systems // IET Information Security. -Vol. 5, nr. Iss 3 (2011), s.135-144
DOI:
Digital Object Identifier (open in new tab) 10.1049/iet-ifs.2010.0261
Verified by:
Gdańsk University of Technology

seen 116 times

Recommended for you

Meta Tags