[go: up one dir, main page]

AbuEmera et al., 2022 - Google Patents

Security framework for identifying threats in smart manufacturing systems using STRIDE approach

AbuEmera et al., 2022

Document ID
8487388778688086595
Author
AbuEmera E
ElZouka H
Saad A
Publication year
Publication venue
2022 2nd International conference on consumer electronics and computer engineering (ICCECE)

External Links

Snippet

Cyber security is still the main argument in any system development lifecycle that needs more concern. There are still numerous challenges associated with conducting a threat modeling approach for smart manufacturing systems. One of these challenges is the lack of …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • G06Q10/0635Risk analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Similar Documents

Publication Publication Date Title
Moudoud et al. Prediction and detection of FDIA and DDoS attacks in 5G enabled IoT
US20240073242A1 (en) Cyber security appliance for an operational technology network
Gao et al. SCADA communication and security issues
Ahmed et al. Scada systems: Challenges for forensic investigators
AbuEmera et al. Security framework for identifying threats in smart manufacturing systems using STRIDE approach
Fan et al. Overview of cyber-security of industrial control system
Meshram et al. Anomaly detection in industrial networks using machine learning: a roadmap
Settanni et al. Protecting cyber physical production systems using anomaly detection to enable self-adaptation
CN115150208B (en) Zero-trust-based Internet of things terminal secure access method and system
Ferencz et al. Review of industry 4.0 security challenges
Davidson et al. On SCADA PLC and fieldbus cyber-security
CN111193738A (en) Intrusion detection method of industrial control system
Dondossola et al. Effects of intentional threats to power substation control systems
Rekik et al. A cyber-physical threat analysis for microgrids
Liebl et al. Threat analysis of industrial internet of things devices
Al Baalbaki et al. Autonomic critical infrastructure protection (acip) system
Calvo et al. Key Vulnerabilities of Industrial Automation and Control Systems and Recommendations to Prevent Cyber-Attacks.
Kamal et al. Identifying and scoring vulnerability in scada environments
Mesbah et al. Cyber threats and policies for industrial control systems
Irmak et al. Experimental analysis of the internal attacks on scada systems
CN111338297B (en) Industrial control safety framework system based on industrial cloud
Pricop Security of industrial control systems-an emerging issue in romania national defense
Lekidis Cyber-attack TTP analysis for EPES systems
Paul et al. Overview of Cyber Security in Intelligent and Sustainable Manufacturing
Marković-Petrović Methodology for Cyber Security Risk Mitigation in Next Generation SCADA Systems