skip to main content
10.1145/3140241.3140251acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
short-paper

"How Long is a Piece of String":: Defining Key Phases andObserved Challenges within ICS Risk Assessment

Published:03 November 2017Publication History

ABSTRACT

The numbers and severity of global cyber security attacks on Industrial Control Systems have increased over recent years. However, there are also significant efforts to improve defensive capabilities. While comprehensive reviews of risk assessment efforts exist, little detail is currently available on how they are being applied by security practitioners. This paper provides a summary of the approaches adopted by security practitioners, outlining key phases applied to risk assessment, application of existing predefined methodologies, and challenges faced throughout the overall process.

References

  1. Hilary Arksey and Peter T. Knight. 1999. Interviewing for social scientists: An introductory resource with examples. Sage, London. Google ScholarGoogle ScholarCross RefCross Ref
  2. British Standards Institute. 2010. BS ISO/IEC 31010 - Risk Management - Risk Assessment Techniques. (2010).Google ScholarGoogle Scholar
  3. Jeremy Simon Busby, Benjamin Green, and David Hutchison. 2017. Analysis of Affordance, Time, and Adaptation in the Assessment of Industrial Control System Cybersecurity Risk. Risk Analysis (2017).Google ScholarGoogle Scholar
  4. Donald Thomas Campbell and Julian C. Stanley. 1963. Experimental and quasiexperimental designs for research on teaching. Ravenio Books.Google ScholarGoogle Scholar
  5. David Canter, Jennifer Brown, and Michael Brenner. 1985. The research interview: Uses and approaches. Academic Press, New York.Google ScholarGoogle Scholar
  6. Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, and Kristan Stoddart. 2016. A review of cyber security risk assessment methods for SCADA systems. computers & security 56 (2016), 1--27.Google ScholarGoogle Scholar
  7. CPNI. 2017. Critical National Infrastructure. (2017). https://www.cpni.gov.uk/critical-national-infrastructure-0Google ScholarGoogle Scholar
  8. Dragos. 2017. CRASHOVERRIDE: Analysis of the Threat to Electric Grid Operations. Technical Report. https://dragos.com/blog/crashoverride/CrashOverride-01.pdfGoogle ScholarGoogle Scholar
  9. James H. Frey. 1983. Survey Research by Telephone. SAGE Publications, Beverly Hills.Google ScholarGoogle Scholar
  10. Deianira Ganga and Sam Scott. 2006. Cultural "insiders" and the issue of positionality in qualitative migration research: Moving" across" and moving "along" researcher-participant divides. In Forum Qualitative Sozialforschung/Forum: Qualitative Social Research, Vol. 7.Google ScholarGoogle Scholar
  11. Barney Glaser and Anselm Strauss. 1967. Grounded theory: the discovery of grounded theory. Sociology The Journal Of The British Sociological Association 12 (1967), 27--49.Google ScholarGoogle Scholar
  12. Benjamin Green, Sylvain Andre, Francis Frey, Awais Rashid, and David Hutchison. 2016. Testbed diversity as a fundamental principle for effective ICS security research. In SERECIN.Google ScholarGoogle Scholar
  13. Benjamin Green, Marina Krotofil, and David Hutchison. 2016. Achieving ICS Resilience and Security Through Granular Data Flow Management. In Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. ACM, 93--101. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Benjamin Green, Anhtuan Lee, Rob Antrobus, Utz Roedig, David Hutchison, and Awais Rashid. 2017. Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research. In 10th USENIX Workshop on Cyber Security Experimentation and Test (CSET 17). USENIX Association.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Benjamin Green, Daniel Prince, Jerry Busby, and David Hutchison. 2015. The Impact of Social Engineering on Industrial Control System Security. In Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and/or PrivaCy. ACM, 23--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Benjamin Green, Daniel Prince, Jerry Busby, and David Hutchison. 2017. Interview Protocol/Guide. (2017). https://tinyurl.com/ybo9r9bkGoogle ScholarGoogle Scholar
  17. ISA/IEC. 2017. Security for Industrial Automation and Control Systems: Security Risk Assessment, System Partitioning and Security Levels. Technical Report. ISA/IEC.Google ScholarGoogle Scholar
  18. Joint Task Force Transformation Initiative. 2012. Guide for Conducting Risk Assessments. Technical Report.Google ScholarGoogle Scholar
  19. Nigel King, C. Cassell, and G. Symon. 1994. Qualitative methods in organizational research: A practical guide. The Qualitative Research Interview 17 (1994).Google ScholarGoogle Scholar
  20. William Knowles, Daniel Prince, David Hutchison, Jules Ferdinand Pagna Disso, and Kevin Jones. 2015. A survey of cyber security management in industrial control systems. International Journal of Critical Infrastructure Protection 9 (2015), 52--80. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Grant McCracken. 1988. The long interview. Vol. 13. Sage, London. Google ScholarGoogle ScholarCross RefCross Ref
  22. Ben Paske, Benjamin Green, Daniel Prince, and David Hutchison. 2014. Design and Construction of an Industrial Control System Testbed. In PGNET. 151--156.Google ScholarGoogle Scholar
  23. Michael Quinn Patton. 1990. Qualitative evaluation and research methods. SAGE, London.Google ScholarGoogle Scholar
  24. Janet Powney and Mike Watts. 1987. Interviewing in educational research. Routledge & Kegan Paul, Ablingdon.Google ScholarGoogle Scholar
  25. Herbert J. Rubin and Irene S. Rubin. 2011. Qualitative interviewing: The art of hearing data. Sage, London.Google ScholarGoogle Scholar
  26. Robert Philip Weber. 1985. Basic Content Analysis (first ed.). Sage Publications, Beverly HillGoogle ScholarGoogle Scholar

Index Terms

  1. "How Long is a Piece of String":: Defining Key Phases andObserved Challenges within ICS Risk Assessment

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          CPS '17: Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy
          November 2017
          146 pages
          ISBN:9781450353946
          DOI:10.1145/3140241

          Copyright © 2017 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 November 2017

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • short-paper

          Acceptance Rates

          CPS '17 Paper Acceptance Rate8of10submissions,80%Overall Acceptance Rate53of66submissions,80%

          Upcoming Conference

          CCS '24
          ACM SIGSAC Conference on Computer and Communications Security
          October 14 - 18, 2024
          Salt Lake City , UT , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader