IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)
View Sample PDF
Author(s): Roberto Mugavero (Department of Electronic Engineering – University of Rome “Tor Vergata”, Rome, Italy), Stanislav Abaimov (National Inter-Universitary Consortium for Telecommunications, Italy), Federico Benolli (OSDIFE - Observatory on Security and CBRNe Defence, Rome, Italy) and Valentina Sabato (OSDIFE - Observatory on Security and CBRNe Deefence, Rome, Italy)
Copyright: 2020
Pages: 33
Source title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-7998-2466-4.ch056

Purchase

View Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS) on the publisher's website for pricing and purchasing information.

Abstract

As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.

Related Content

Ibrahim Firat. © 2021. 19 pages.
Sobana Sikkanan, Kasthuri M.. © 2021. 29 pages.
Arushi Arora, Sumit Kumar Yadav, Kavita Sharma. © 2021. 25 pages.
Prachi. © 2021. 15 pages.
Konstantinos F. Xylogiannopoulos, Panagiotis Karampelas, Reda Alhajj. © 2021. 15 pages.
Rizwan Ur Rahman, Deepak Singh Tomar. © 2021. 34 pages.
Kamal Alieyan, Ammar Almomani, Rosni Abdullah, Badr Almutairi, Mohammad Alauthman. © 2021. 13 pages.
Body Bottom