TY - GEN
T1 - Challenges in quantifying an adversary’s cyber access to critical infrastructures
AU - Nicol, David M.
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020
Y1 - 2020
N2 - We consider the problem of quantifying the potential for an adversary to move through the computer/communication network controlling a critical infrastructure. Quantification is needed to describe the risk to the critical infrastructure of cyber penetration in terms understandable to the owners/operators of the critical infrastructure. We identify several specific challenges, and conclude without having solved the problem, but having pointed the way towards some possible solutions.
AB - We consider the problem of quantifying the potential for an adversary to move through the computer/communication network controlling a critical infrastructure. Quantification is needed to describe the risk to the critical infrastructure of cyber penetration in terms understandable to the owners/operators of the critical infrastructure. We identify several specific challenges, and conclude without having solved the problem, but having pointed the way towards some possible solutions.
KW - Critical infrastructures
KW - Cyber-security
KW - Metrics
UR - http://www.scopus.com/inward/record.url?scp=85077501408&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85077501408&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-37670-3_2
DO - 10.1007/978-3-030-37670-3_2
M3 - Conference contribution
AN - SCOPUS:85077501408
SN - 9783030376697
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 18
EP - 28
BT - Critical Information Infrastructures Security - 14th International Conference, CRITIS 2019, Revised Selected Papers
A2 - Nadjm-Tehrani, Simin
PB - Springer
T2 - 14th International Conference on Critical Information Infrastructures Security, CRITIS 2019
Y2 - 23 September 2019 through 25 September 2019
ER -