TITLE

The human role in tools for improving robustness and resilience of critical infrastructures

AUTHOR(S)
Amantini, Aladino; Choras, Michal; D'Antonio, Salvatore; Egozcue, Elyoenai; Germanus, Daniel; Hutter, Reinhard
PUB. DATE
June 2012
SOURCE
Cognition, Technology & Work;Jun2012, Vol. 14 Issue 2, p143
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
This paper presents a project dedicated to the development of means for improving the resilience of Critical Infrastructures (CIs) with respect to cyber attacks. The ability to sustain and protect the flow of information and data and the possibility to early detect, isolate and eliminate cyber hazards have become issues of paramount importance when developing the Supervisory Control And Data Acquisition (SCADA) systems of such a CI. The majority of tools dedicated to these goals are based on fully automatic autonomous self-reconfigurable systems that operate within the network, or online. However, the possibility to enable also human intervention for the further reduction in the vulnerability of CIs is equally possible. In this case, the intervention is considered offline and requires the active co-operation between a decision aid tool and a human operator. This paper presents a project aimed at improving robustness and resilience of CIs and discusses in particular the human interfaces associated with the offline tools. In essence, it is found that while the guidelines of the usability principle must be preserved, special account must be given to the type of issues involved and high professionalism of their users. This implies that certain basic criteria of the usability principle may be less relevant and their limitations may not be respected without loosing effectiveness and strength of the tools.
ACCESSION #
75163124

 

Related Articles

  • Hybrid Key Management Architecture for Robust SCADA Systems. DONGHYUN CHOI; HANJAE JEONG; DONGHO WON; SEUNGJOO KIM // Journal of Information Science & Engineering;Mar2013, Vol. 29 Issue 2, p281 

    Recently, as a demand for connecting Supervisory Control and Data Acquisition (SCADA) systems to open networks increases, the study of SCADA system security becomes an issue. Many researchers have proposed key management schemes for SCADA systems. However, previous studies lack the proper...

  • Attack-Aware Supervisory Control and Data Acquisition (SCADA). Alexander, Otis; Chung, Sam; Endicott-Popovsky, Barbara // Proceedings of the International Conference on Information Warfa;2013, p251 

    SCADA systems are used for geographically distributed process control. These systems are used in national critical infrastructure such as transportation, power grid, water facilities, etc. Malfunctions in these systems can be catastrophic and can potentially cause harm to the environment and...

  • Guard the grid against attack. Marks, Paul // New Scientist;11/3/2012, Vol. 216 Issue 2889, p20 

    The article looks at a computer operating system designed by cybersecurity company Kaspersky Labs for use in control systems for utilities such as power stations, factories, and pipelines. The system would prevent attacks from computer worms or viruses from prompting supervisory control and data...

  • Towards A Theory of Autonomous Reconstitution of Compromised Cyber-Systems. Ramuhalli, Pradeep; Halappanavar, Mahantesh; Coble, Jamie; Dixit, Mukul // Homeland Security Affairs;Apr2014 Supplement 6, p1 

    Effective reconstitution approaches for cyber systems are needed to keep critical infrastructure operational in the face of an intelligent adversary. The reconstitution response, including recovery and evolution, may require significant reconfiguration of the system at all levels to render the...

  • Latest Threats To Pipeline, Production And Process Management Systems. Dickman, Frank // Pipeline & Gas Journal;Feb2013, Vol. 240 Issue 2, p48 

    The article offers the author's insights regarding the new threats to the supervisory control and data acquisition (SCADA) systems of pipeline and gas industry. The author says that computer worms like Stuxnet, Duqu, and Flame target SCADA systems and other legacy control systems used in the...

  • SCADA Threats in the Modern Airport. McCarthy, John; Mahoney, William // Proceedings of the International Conference on Information Warfa;2013, p141 

    Critical infrastructures are ubiquitous in the modern world and include electrical power systems, water, gas, and other utilities, as well as trains and transportation systems including airports. This work is concerned with Supervisory Control And Data Acquisition (SCADA) systems that are at the...

  • Authenticated Smart Powercomm: A Review. Kathirvelu, K. Parkavi; Balasubramanian, R.; Amirtharajan, Rengarajan // Information Technology Journal;2015, Vol. 14 Issue 1, p10 

    Smart grid system is a convoluted system in order to provide profound changes in the current grid system. This is fully automated grid utilizes latest information, communication techniques and internet which is truly interconnected and highly open to cyber attacks. Any attack in one location...

  • Smartness in control. OHRN, MARINA; KAZEMZADEH, HORMOZ // Transmission & Distribution World Exclusive Insight;3/16/2012, p1 

    The article previews the integrated supervisory control and data acquisition/distribution management systems (SCADA/DMS).

  • An open virtual testbed for industrial control system security research. Reaves, Bradley; Morris, Thomas // International Journal of Information Security;Aug2012, Vol. 11 Issue 4, p215 

    Industrial control system security has been a topic of scrutiny and research for several years, and many security issues are well known. However, research efforts are impeded by a lack of an open virtual industrial control system testbed for security research. This paper describes a virtual...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics