公用事业网络安全指南:瑞士方法

S. Teufel, Rolf Burri, B. Teufel
{"title":"公用事业网络安全指南:瑞士方法","authors":"S. Teufel, Rolf Burri, B. Teufel","doi":"10.1109/ICSGCE.2018.8556819","DOIUrl":null,"url":null,"abstract":"It is no secret that cyberattacks have increased strongly, especially in the energy sector. This is among other things associated with the so-called digitization, i.e., the substantial use of sensors and information and communication technology. Therefore, cybersecurity developed to a major concern of utility companies as cyber-criminals attack production plants, distribution networks, assets and customer information. Cyber-criminals goals vary substantively, so there might be political driven reasons for an attack, even to financial driven attacks to harm the electricity availability combined with increasing financial pains. The possible impact of a successful attack is much bigger than any planned business continuity case. Therefore, a framework on cybersecurity guideline is introduced allowing utility companies to measure own cybersecurity maturity including a comparison against a baseline or measured results from equal/similar companies. The guideline also helps to build an intelligent risk register with risk probability and risk impact to quantify the risks from financial point of view, as well as for remediation purposes.","PeriodicalId":366392,"journal":{"name":"2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Cybersecurity Guideline for the Utility Business a Swiss Approach\",\"authors\":\"S. Teufel, Rolf Burri, B. Teufel\",\"doi\":\"10.1109/ICSGCE.2018.8556819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is no secret that cyberattacks have increased strongly, especially in the energy sector. This is among other things associated with the so-called digitization, i.e., the substantial use of sensors and information and communication technology. Therefore, cybersecurity developed to a major concern of utility companies as cyber-criminals attack production plants, distribution networks, assets and customer information. Cyber-criminals goals vary substantively, so there might be political driven reasons for an attack, even to financial driven attacks to harm the electricity availability combined with increasing financial pains. The possible impact of a successful attack is much bigger than any planned business continuity case. Therefore, a framework on cybersecurity guideline is introduced allowing utility companies to measure own cybersecurity maturity including a comparison against a baseline or measured results from equal/similar companies. The guideline also helps to build an intelligent risk register with risk probability and risk impact to quantify the risks from financial point of view, as well as for remediation purposes.\",\"PeriodicalId\":366392,\"journal\":{\"name\":\"2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)\",\"volume\":\"57 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-05-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICSGCE.2018.8556819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Smart Grid and Clean Energy Technologies (ICSGCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSGCE.2018.8556819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

众所周知,网络攻击的增长势头强劲,尤其是在能源领域。这是与所谓的数字化相关的其他事情之一,即大量使用传感器和信息和通信技术。因此,随着网络罪犯攻击生产工厂、分销网络、资产和客户信息,网络安全发展成为公用事业公司的主要关注点。网络罪犯的目标各不相同,因此攻击可能有政治驱动的原因,甚至是经济驱动的攻击,以破坏电力供应,并增加财务痛苦。成功攻击的可能影响比任何计划好的业务连续性案例都要大得多。因此,引入了一个网络安全指导框架,允许公用事业公司衡量自己的网络安全成熟度,包括与基线或来自同等/类似公司的测量结果进行比较。该指南还有助于建立一个具有风险概率和风险影响的智能风险登记册,以便从财务角度量化风险,以及用于补救目的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Cybersecurity Guideline for the Utility Business a Swiss Approach
It is no secret that cyberattacks have increased strongly, especially in the energy sector. This is among other things associated with the so-called digitization, i.e., the substantial use of sensors and information and communication technology. Therefore, cybersecurity developed to a major concern of utility companies as cyber-criminals attack production plants, distribution networks, assets and customer information. Cyber-criminals goals vary substantively, so there might be political driven reasons for an attack, even to financial driven attacks to harm the electricity availability combined with increasing financial pains. The possible impact of a successful attack is much bigger than any planned business continuity case. Therefore, a framework on cybersecurity guideline is introduced allowing utility companies to measure own cybersecurity maturity including a comparison against a baseline or measured results from equal/similar companies. The guideline also helps to build an intelligent risk register with risk probability and risk impact to quantify the risks from financial point of view, as well as for remediation purposes.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
ICT Requirements and Challenges for Provision of Grid Services from Renewable Generation Plants A Low-Cost and Energy-Efficient Smart Dust Cleaning Technique for Solar Panel System Design and Implementation of a Maximum Power Point Tracking Algorithm for Wind Turbines Using PLC-SCADA On the Investigation and Experimental Analysis of Energy-Efficient Lighting for a University Building Investigation and Analyses of Energy-Efficient Technologies for HVAC and Lighting Systems via Energy Auditing Processes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1