Consequence-based resilient architectures

0Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

As described in Lee et al., cyber-attackers conducted a coordinated, multifaceted operation against three distribution companies on 23 December 2015, resulting in a customer outage of nearly 4 hours. The significance in this event does not originate from the infiltration of the electric sector; on the contrary, Gorman, Toppa, Perlroth, Dearden, and Borger indicate they have been compromised before and will continue to be compromised in the future. Nor was this event significant because it harkened the arrival of some previously unknown, sophisticated industrial control system (ICS) malware, as Karnouskos, Fidler and Matrosov et al. argued was the case with Stuxnet. Rather, the significance of the December 2015 event stems from the means by which the attackers interfaced with and, ultimately, used the energy system design to their advantage.

Cite

CITATION STYLE

APA

St. Michel, C., & Freeman, S. (2019). Consequence-based resilient architectures. In Advances in Information Security (Vol. 75, pp. 17–28). Springer New York LLC. https://doi.org/10.1007/978-3-030-18214-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free