【24h】

SCENARIO-BASED APPROACH TO RISK ANALYSIS IN SUPPORT OF CYBER SECURITY

机译:基于场景的风险分析方法支持网络安全性

获取原文

摘要

The US infrastructure is continually challenged by hostile nation states and others who would do us harm. Cyber vulnerabilities and weaknesses are potential targets and are the result of years of construction and technological improvement in a world less concerned with security than is currently the case. As a result, cyber attack presents a class of challenges for which we are just beginning to prepare. What has been done in the nuclear, chemical and energy sectors as a means of anticipating and preparing for randomly occurring accidents and off-normal events is to develop scenarios as a means by which to prioritize and quantify risk and to take action. However, the number of scenarios risk analysts can develop is almost limitless. How do we ascertain which scenario has the greatest merit? One of the more important contributions of probabilistic risk analysis (PRA) has been to quantify the initiating event probability associated with various classes of accidents; and to quantify the occurrence of various conditions, i.e., end-states, as a function of these important accident sequences. Typically, various classes of conditions are represented by scenarios and are quantified in terms of cut sets and binned into end states. For example, the nuclear industry has a well-defined set of initiating events that are studied in assessing risk. The maturation of risk analysis for cyber security from accounting for barriers or looking at conditions statically to one of ascertaining the probability associated with certain events is, in part, dependent upon the adoption of a scenario-based approach. For example, scenarios take into account threats to personnel and public safety; economic damage, and compromises to major operational and safety functions. Scenarios reflect system, equipment, and component configurations as well as key human-system interactions related to event detection, diagnosis, mitigation and restoration of systems. As part of a cyber attack directed toward control systems, perpetrators will attempt to control and defeat automation systems, engineering access, control systems and protective systems implemented in today's critical infrastructures. Major systems such as supervisory control and data acquisition (SCADA) systems are likely targets for attack. Not all attack scenarios have the same expected frequency or consequence. The attacks will be directed and structured and thus, are not be characterized as random events when one considers failure probabilities. Attack types differ in their consequence as a function of the probability associated with various sub events in the presence of specific system configurations. Ideally, a series of generic scenarios can be identified for each of the major critical infrastructure (CI) sectors. A scenario-based approach to risk assessment allows decision makers to place financial and personnel resources in-place for attacks that truly matter: e.g. attacks that generate physical and economic damage. The use of scenario-based analysis allows risk reduction goals to be informed by more than consequence analysis alone. The key CI targets used in the present study were identified previously as part of a mid-level consequence analysis performed at INL by the Control System Security Program (CSSP) for the National Cyber Security Division (NCSD) of the Department of Homeland Security (DHS). This paper discusses the process for and results associated with the development of scenario-based cyber attacks upon control systems including the information and personnel requirements for scenario development. Challenges to scenario development including completeness and uncertainty characterization are discussed as well. Further, the scenario discussed herein, is one of a number of scenarios for infrastructures currently under review.
机译:美国基础设施不断受到敌对国家和其他人伤害的其他人的挑战。网络脆弱性和弱点是潜在的目标,并且是多年的建设和技术改善,而不是安全的世界,而不是目前的情况。因此,网络攻击呈现了一类我们刚开始准备的挑战。核,化学和能源部门所做的是一种预测和准备随机发生的事故和非正常事件的手段是制定场景,作为优先考虑和量化风险和采取行动的手段。然而,风险分析师的情景数量可能发展几乎无限。我们如何确定哪个方案具有最大的优点?概率风险分析(PRA)的更重要贡献之一是量化与各类事故相关的启动事件概率;并且量化各种条件的发生,即最终状态,作为这些重要事故序列的函数。通常,各种类条件由场景表示,并且在切割集和箱中的终端状态方面被量化。例如,核工业有一个明确定义的启动事件,在评估风险时研究。从核算障碍或静态地看待与某些事件相关的概率的一个障碍的网络安全的风险分析成熟是部分地取决于采用基于场景的方法。例如,方案考虑到人员和公共安全的威胁;经济损害,妥协于主要的运营和安全功能。场景反映系统,设备和组件配置以及与事件检测,诊断,缓解和修复系统相关的关键人体系统相互作用。作为针对控制系统的网络攻击的一部分,肇事者将试图控制和击败在当今的关键基础架构中实施的自动化系统,工程访问,控制系统和保护系统。诸如监督控制和数据采集(SCADA)系统的主要系统可能是攻击的目标。并非所有攻击情景都具有相同的预期频率或后果。攻击将被引导和结构,因此,当一个人考虑失败概率时,不得被称为随机事件。攻击类型的结果不同,因为在存在特定系统配置的存在中与各种子事件相关的概率的函数。理想情况下,可以为每个主要关键基础设施(CI)扇区中的每一个来识别一系列通用方案。基于方案的风险评估方法允许决策者将财务和人员资源放置真正重要的攻击:例如产生身体和经济损害的攻击。使用基于场景的分析允许风险降低目标通过单独的后果分析来告知。本研究中使用的关键CI靶以先前作为在国内安全部的国家网络安全部(NCSD)的控制系统安全计划(CSSP)在INL执行的中级后果分析的一部分(DHS )。本文讨论了与控制系统中基于场景的网络攻击的发展相关的过程和结果,包括情景开发的信息和人员要求。还讨论了包括完整性和不确定性表征的情景发展的挑战。此外,这里讨论的场景是当前正在审查的基础设施的许多场景之一。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号