Corpus ID: 26590480

The State of Security in Control Systems Today

  title={The State of Security in Control Systems Today},
  author={D. Harp and Extra Slides},
Exploring Industry Cybersecurity Strategy in Protecting Critical Infrastructure
Exploring Industry Cybersecurity Strategy in Protecting Critical Infrastructure by Mark Allen Boutwell MS, Walden University, 2017 MS, University of Phoenix, 2009 BS, Hawaii Pacific University, 2003Expand
Incentivizing Cyber Security Investment in the Power Sector Using An Extended Cyber Insurance Framework
Collaboration between the DHS Cybersecurity and Infrastructure Security Agency (CISA) and publicsector partners has revealed that a dearth of cyberincident data combined with the unpredictability ofExpand
The Good, the Bad and the Ugly: A Study of Security Decisions in a Cyber-Physical Systems Game
Surprisingly, security experts were not ipso facto better players—in some cases, they made very questionable decisions—yet they showed a higher level of confidence in themselves, and classified players’ decision-making processes, i.e., procedure-, experience-, scenario- or intuition-driven. Expand
Advantages of Anomaly Detection Between the Controlling Unit and the Process Devices of an Industrial Control System
Industrial Control Systems (ICSs) have recently been embedding common IT solutions for costperformance reasons. This made them more accessible for the outside world, and more prone to its problems.Expand
An Expanded Cyber Insurance Framework to Mitigate Cyber Induced Economic Losses of the U.S. Power Industry
Cyber incidents are increasing in the United States and critical infrastructure is no exception. Aging operational technology is reliable, but much of it was not conceived in this century and lacksExpand
Gamifying Education and Research on ICS Security: Design, Implementation and Results of S3
This work tested the proposed ICS security gamification idea in the context of the first Capture-The-Flag (CTF) event targeted to I CS security called SWaT Security Showdown (S3), where six teams acted as attackers in a security competition leveraging an ICS testbed. Expand
Gamifying ICS Security Training and Research: Design, Implementation, and Results of S3
This work developed ICS-specific challenges involving both theoretical and applied ICS security concepts and developed a scoring system based on multiple factors, including realistic ICS attacker models and effectiveness of the detection mechanisms of the defenders. Expand
The 2017 Power Industry Division ( POWID ) Symposium is Coming Soon !
The decentralization and the associated future structure of demand management at grid level raises new challenges for operators. Sustainable and economic operation management requires seamless accessExpand
An Internet-wide view of ICS devices
This work implements five common SCADA protocols in ZMap and conducts a survey of the public IPv4 address space finding more than 60K publicly accessible systems and uses a large network telescope and high-interaction honeypots to find and profile actors searching for devices. Expand
Detection of Man-in-the-Middle Attacks on Industrial Control Networks
The approach uses anomaly detection by developing a model of normal behaviour of the industrial control system network by using the k-Nearest Neighbors algorithm with Bregman divergence to detect Man-in-the-Middle attacks on industrial control systems. Expand