首页> 外文会议>Hawaii International Conference on System Sciences >Trust but Verify Critical Infrastructure Cyber Security Solutions
【24h】

Trust but Verify Critical Infrastructure Cyber Security Solutions

机译:信任但验证关键基础架构网络安全解决方案

获取原文

摘要

Critical infrastructure cyber security solutions for industrial control systems are touted by the sellers as standards-based and comprehensive. Buyer beware, most of these claims are highly exaggerated. Only the International Society for Automation (ISA) is developing standards that are comprehensive in the sense that cyber security requirements control systems are defined as an extension of the security policies for the enterprise. Furthermore, these ISA standards include requirements that account for the dynamics induced by human behavior and the constraints imposed by external interfaces that are not directly controlled by the enterprise owner. This paper describes the seven foundational requirements codified in ISA-99.01-01 and the derived system requirements and metrics. The paper concludes with example security metrics recommended to verify the quality of cyber solutions offered.
机译:关键基础设施网络安全解决方案的工业控制系统被卖家吹捧为基于标准和全面的标准。买家小心,大多数这些索赔都高度夸大。只有国际自动化协会(ISA)正在开发全面的标准,即网络安全要求控制系统被定义为企业安全策略的扩展。此外,这些ISA标准包括占人类行为引起的动态的要求以及由企业所有者直接控制的外部接口强加的限制。本文介绍了ISA-99.01-01中编写的七种基础要求及派生系统要求和指标。本文结束了示例安全指标,建议验证提供的网络解决方案的质量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号