TY - JOUR
T1 - Threat Assessment Model in Electrical Power Grid Environment
AU - Qassim, Qais Saif
AU - Jamil, Norziana
AU - Mahdi, Mohammed Najah
AU - Rahim, Fiza Abd
AU - Cob, Zaihisma Che
AU - Sidek, Lariyah Mohd
N1 - Publisher Copyright:
© Published under licence by IOP Publishing Ltd.
PY - 2021/7/26
Y1 - 2021/7/26
N2 - At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.
AB - At the heart of every critical national infrastructure, there is a SCADA system. The wide range of supported applications has made this life-saving management system the key element of every industrial control infrastructure in various sectors. The complexity and sophistication of SCADA systems have been increased dramatically over the last few years. Various cyberattacks have targeted these systems by exploiting zero-day vulnerabilities or targeting a nearby Internet-enabled appliance or computer system. To this end, many efforts have been proposed previously to model the threats on SCADA systems to eliminate potential danger and diminish the catastrophic consequences in the physical domain. The main contribution of this work is to present a multi-facets threat assessment model to aid security teams to systematically perform various cybersecurity analysis practices such as penetration testing, vulnerability assessment and risk analysis.
UR - http://www.scopus.com/inward/record.url?scp=85111955954&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85111955954&partnerID=8YFLogxK
U2 - 10.1088/1742-6596/1962/1/012014
DO - 10.1088/1742-6596/1962/1/012014
M3 - Conference article
AN - SCOPUS:85111955954
SN - 1742-6588
VL - 1962
JO - Journal of Physics: Conference Series
JF - Journal of Physics: Conference Series
IS - 1
M1 - 012014
T2 - 1st International Conference on Engineering and Technology, ICoEngTech 2021
Y2 - 15 March 2021 through 16 March 2021
ER -