Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)
View Sample PDF
Author(s): Roberto Mugavero (Department of Electronic Engineering – University of Rome “Tor Vergata”, Rome, Italy), Stanislav Abaimov (National Inter-Universitary Consortium for Telecommunications, Italy), Federico Benolli (OSDIFE - Observatory on Security and CBRNe Defence, Rome, Italy) and Valentina Sabato (OSDIFE - Observatory on Security and CBRNe Deefence, Rome, Italy)
Copyright: 2018
Volume: 10
Issue: 2
Pages: 30
Source title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
Editor(s)-in-Chief: Víctor Amadeo Bañuls Silvera (Universidad Pablo de Olavide, Spain) and Murray E. Jennex (San Diego State University, USA)
DOI: 10.4018/IJISCRAM.2018040103


View Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS) on the publisher's website for pricing and purchasing information.


As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.

Related Content

Tahsina Islam, Md. Azijul Islam, Md. Shahidul Islam, Nishat Farzana Nimni. © 2020. 13 pages.
Rabindra Lamsal, T. V. Vijay Kumar. © 2020. 16 pages.
Phitalis Were Masakhwe, Kennedy Onkware, Susan Kilonzo. © 2020. 9 pages.
Vicente Sandoval, Juan Pablo Sarmiento, Erick Alberto Mazariegos, Daniel Oviedo. © 2020. 16 pages.
Georgios Charalampos E. Kafoutis, Ioannis M. Dokas. © 2020. 19 pages.
Uma Shankar Prasad. © 2019. 14 pages.
Marco Michael Nitzschner, Ursa K J Nagler, Michael Stein. © 2019. 14 pages.
Body Bottom