IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)
View Sample PDF
Author(s): Roberto Mugavero (Department of Electronic Engineering – University of Rome “Tor Vergata”, Rome, Italy), Stanislav Abaimov (National Inter-Universitary Consortium for Telecommunications, Italy), Federico Benolli (OSDIFE - Observatory on Security and CBRNe Defence, Rome, Italy)and Valentina Sabato (OSDIFE - Observatory on Security and CBRNe Deefence, Rome, Italy)
Copyright: 2018
Volume: 10
Issue: 2
Pages: 30
Source title: International Journal of Information Systems for Crisis Response and Management (IJISCRAM)
Editor(s)-in-Chief: Víctor Amadeo Bañuls Silvera (Universidad Pablo de Olavide, Spain)and Murray E. Jennex (San Diego State University, USA)
DOI: 10.4018/IJISCRAM.2018040103

Purchase

View Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS) on the publisher's website for pricing and purchasing information.

Abstract

As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.

Related Content

Mai Do, Jannette Diep, NhuNgoc K. Pham. © 2023. 14 pages.
O'Neil G. Blake, Eric Russell. © 2023. 15 pages.
Mahdi Nasereddin, Michael Bartolacci, Joanne C. Peca, Edward J. Glantz, Galen Grimes, Tyler Verlato. © 2023. 16 pages.
Chayanee Wongsuriyanan, Shoji Tsuchida. © 2023. 14 pages.
Subhankar Dhar, Jerry Zeyu Gao. © 2023. 22 pages.
Agnes Kalekye Kithikii, Edward Musungu Mugalavai, Samuel Soita China. © 2023. 19 pages.
Byunggi Choi, Tony McAleavy, Alina Mizell. © 2022. 15 pages.
Body Bottom