Reference Hub2
Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)

Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)

Roberto Mugavero, Stanislav Abaimov, Federico Benolli, Valentina Sabato
Copyright: © 2018 |Volume: 10 |Issue: 2 |Pages: 30
ISSN: 1937-9390|EISSN: 1937-9420|EISBN13: 9781522543831|DOI: 10.4018/IJISCRAM.2018040103
Cite Article Cite Article

MLA

Mugavero, Roberto, et al. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)." IJISCRAM vol.10, no.2 2018: pp.49-78. http://doi.org/10.4018/IJISCRAM.2018040103

APA

Mugavero, R., Abaimov, S., Benolli, F., & Sabato, V. (2018). Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS). International Journal of Information Systems for Crisis Response and Management (IJISCRAM), 10(2), 49-78. http://doi.org/10.4018/IJISCRAM.2018040103

Chicago

Mugavero, Roberto, et al. "Cyber Security Vulnerability Management in CBRN Industrial Control Systems (ICS)," International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 10, no.2: 49-78. http://doi.org/10.4018/IJISCRAM.2018040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

As cyberattacks are becoming the prevalent types of attacks on critical infrastructures, due protection and effective response are crucial in CBRN facilities. This article explores comprehensive cyber security vulnerability management related to CBRN Control Systems and Industrial Control Systems (ICS) and provides recommendations that will increase CBRN operational cyber security and ensure further platform for the research in the field of operational vulnerability detection and remediation. The article reviews several key issues related to ICS vulnerability management cycle, vulnerability sharing with security developers, patch and network management, cyber offensive threats and threat actors and related cyber security challenges. It covers such specific issues as ICS connectivity to private/public networks, critical ICS accessibility via Web Access, Wi-Fi and/or unauthorised software inside corporate networks. The proposed solutions refer to some areas of vulnerability management for the awareness and development of countermeasures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.