Jones et al., 2012 - Google Patents
A system‐aware cyber security architectureJones et al., 2012
View PDF- Document ID
- 17040236885078543951
- Author
- Jones R
- Horowitz B
- Publication year
- Publication venue
- Systems Engineering
External Links
Snippet
As exemplified in the 2010 Stuxnet attack on an Iranian nuclear facility, attackers have the capabilities to embed infections in equipment that is employed in nuclear power systems. In this paper, a new systems engineering focused approach for mitigating such risks is …
- 238000000034 method 0 abstract description 47
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Jones et al. | A system‐aware cyber security architecture | |
Nicholson et al. | SCADA security in the light of Cyber-Warfare | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
McLaughlin et al. | The cybersecurity landscape in industrial control systems | |
EP2916511B1 (en) | High assurance security gateway interconnecting different domains | |
Saydjari | Cyber defense: art to science | |
Horowitz et al. | The integration of diversely redundant designs, dynamic system models, and state estimation technology to the cyber security of physical systems | |
Ayala | Cybersecurity lexicon | |
Ashley et al. | Gamification of cybersecurity for workforce development in critical infrastructure | |
Fovino et al. | Cyber security assessment of a power plant | |
Assenza et al. | Cyber threats for operational technologies | |
Ani et al. | Securing industrial control system environments: the missing piece | |
Jansen | Developing and operating industrial security services to mitigate risks of digitalization | |
Karabacak et al. | Zero Trust and Advanced Persistent Threats: Who Will Win the War? | |
Zahid et al. | A security risk mitigation framework for cyber physical systems | |
Jackson | Principles for resilient design-a guide for understanding and implementation | |
Fischer et al. | IT security for functional resilience in energy systems: effect-centric IT security | |
Jones et al. | System-aware security for nuclear power systems | |
Pieters et al. | Cyber security as social experiment | |
Marinova et al. | Hardware Solution for Cybersecurity of Unmanned Systems Critical Infrastructure | |
Horowitz | Security Engineering | |
CAIRE | Human factors in cybersecurity for transportation systems | |
Jones | System-Aware Cyber Security | |
Balakrishnan et al. | Strategies for Improving Cyber Resilience of Data-Intensive Business Information Systems | |
Stamp et al. | Cyber Security Gap Analysis for Critical Energy Systems (CSGACES). |