Preston et al., 2022 - Google Patents
Emerging Threats and Technology Investigation: Industrial Internet of Things-Risk and Mitigation for Nuclear InfrastructurePreston et al., 2022
View PDF- Document ID
- 16202064158806266664
- Author
- Preston J
- Bertolli M
- Eggers S
- McKenzie P
- Thorsen D
- Haack J
- Thomas K
- Burke L
- Rosa De Jesus D
- Publication year
External Links
Snippet
Industries supporting the global nuclear infrastructure striving for cost savings, expansions in efficiency, and convenience are likely to adopt components (eg, hardware, software) that comprise the Internet of Things (IoT) and Industrial Internet of Things (IIoT). These devices …
- 238000005516 engineering process 0 title abstract description 36
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Knapp | Industrial Network Security: Securing critical infrastructure networks for smart grid, SCADA, and other Industrial Control Systems | |
Mullet et al. | A review of cybersecurity guidelines for manufacturing factories in industry 4.0 | |
Yadav et al. | Architecture and security of SCADA systems: A review | |
Giraldo et al. | Security and privacy in cyber-physical systems: A survey of surveys | |
Hammi et al. | Security threats, countermeasures, and challenges of digital supply chains | |
Lera et al. | Cybersecurity of robotics and autonomous systems: Privacy and safety | |
US20140137257A1 (en) | System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure | |
Ali et al. | Cyber security for cyber physical systems | |
Amro et al. | Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth | |
Ayala | Cybersecurity lexicon | |
Palanisamy et al. | Users’ attitude on perceived security of enterprise systems mobility: An empirical study | |
Mitsarakis | Contemporary Cyber Threats to Critical Infrastructures: Management and Countermeasures | |
Lee et al. | Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment. | |
Aslam et al. | Scrutinizing Security in Industrial Control Systems: An Architectural Vulnerabilities and Communication Network Perspective | |
Anderson et al. | Cyber-informed engineering | |
Ginter | Secure operations technology | |
Preston et al. | Emerging Threats and Technology Investigation: Industrial Internet of Things-Risk and Mitigation for Nuclear Infrastructure | |
Griffioen et al. | Assessing risks and modeling threats in the internet of things | |
Prasat et al. | Analysis of Cross-Domain Security and Privacy Aspects of Cyber-Physical Systems | |
de Moura et al. | A cyber-security strategy for internationally-dispersed industrial networks | |
Toth et al. | NIST MEP cybersecurity self-assessment handbook for assessing NIST SP 800-171 security requirements in response to DFARS cybersecurity requirements | |
Kondiloglu et al. | Information security breaches and precautions on Industry 4. 0 | |
Eggers | Towards a New Supply Chain Cybersecurity Risk Analysis Technique | |
Yassine et al. | Security Risk Assessment Methodologies in The Internet of Things: Survey and Taxonomy | |
Demblewski | Security frameworks for machine-to-machine devices and networks |