TY - GEN
T1 - Quantifying availability in SCADA environments using the cyber security metric MFC
AU - Aissa, Anis Ben
AU - Rabai, Latifa Ben Arfa
AU - Abercrombie, Robert K.
AU - Sheldon, Frederick T.
AU - Mili, Ali
N1 - Copyright:
Copyright 2014 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost. Copyright is held by the owner/author(s).
AB - Supervisory Control and Data Acquisition (SCADA) systems are distributed networks dispersed over large geographic areas that aim to monitor and control industrial processes from remote areas and/or a centralized location. They are used in the management of critical infrastructures such as electric power generation, transmission and distribution, water and sewage, manufacturing/industrial manufacturing as well as oil and gas production. The availability of SCADA systems is tantamount to assuring safety, security and profitability. SCADA systems are the backbone of the national cyber-physical critical infrastructure. Herein, we explore the definition and quantification of an econometric measure of availability, as it applies to SCADA systems; our metric is a specialization of the generic measure of mean failure cost. Copyright is held by the owner/author(s).
KW - Availability
KW - Dependability
KW - Security measures
KW - Security requirements
KW - Threats
UR - http://www.scopus.com/inward/record.url?scp=84905487498&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84905487498&partnerID=8YFLogxK
U2 - 10.1145/2602087.2602103
DO - 10.1145/2602087.2602103
M3 - Conference contribution
AN - SCOPUS:84905487498
SN - 9781450328128
T3 - ACM International Conference Proceeding Series
SP - 81
EP - 84
BT - Proceedings of 2014 9th Annual Cyber and Information Security Research Conference, CISRC 2014
PB - Association for Computing Machinery
T2 - 9th Annual Cyber and Information Security Research Conference, CISRC 2014
Y2 - 8 April 2014 through 10 April 2014
ER -