Challenges in quantifying an adversary’s cyber access to critical infrastructures

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We consider the problem of quantifying the potential for an adversary to move through the computer/communication network controlling a critical infrastructure. Quantification is needed to describe the risk to the critical infrastructure of cyber penetration in terms understandable to the owners/operators of the critical infrastructure. We identify several specific challenges, and conclude without having solved the problem, but having pointed the way towards some possible solutions.

Original languageEnglish (US)
Title of host publicationCritical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers
EditorsSimin Nadjm-Tehrani
PublisherSpringer
Pages18-28
Number of pages11
ISBN (Print)9783030376697
DOIs
StatePublished - 2020
Event14th International Conference on Critical Information Infrastructures Security, CRITIS 2019 - Linköping, Sweden
Duration: Sep 23 2019Sep 25 2019

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11777 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference14th International Conference on Critical Information Infrastructures Security, CRITIS 2019
Country/TerritorySweden
CityLinköping
Period9/23/199/25/19

Keywords

  • Critical infrastructures
  • Cyber-security
  • Metrics

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Challenges in quantifying an adversary’s cyber access to critical infrastructures'. Together they form a unique fingerprint.

Cite this