Cyber Security Risk Assessment for Industrial Automation Platform
Title | Cyber Security Risk Assessment for Industrial Automation Platform |
Publication Type | Conference Paper |
Year of Publication | 2015 |
Authors | Zheng, Y., Zheng, S. |
Conference Name | 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP) |
Date Published | Sept. 2015 |
Publisher | IEEE |
ISBN Number | 978-1-5090-0188-0 |
Keywords | analytic hierarchy process, Automation, communication link risk, communication links, computer security, cyber security, cyber security risk assessment, Entropy, entropy theory, fuzzy analytic hierarchy process, fuzzy comprehensive evaluation method, fuzzy set theory, IAP software, industrial automation platform, industrial control, industrial control system, protective strategy, pubcrawl170107, pubcrawl170108, risk assessment, risk management, security of data, Software, Standards |
Abstract | Due to the fact that the cyber security risks exist in industrial control system, risk assessment on Industrial Automation Platform (IAP) is discussed in this paper. The cyber security assessment model for IAP is built based on relevant standards at abroad. Fuzzy analytic hierarchy process and fuzzy comprehensive evaluation method based on entropy theory are utilized to evaluate the communication links' risk of IAP software. As a result, the risk weight of communication links which have impacts on platform and the risk level of this platform are given for further study on protective strategy. The assessment result shows that the methods used can evaluate this platform efficiently and practically. |
URL | https://ieeexplore.ieee.org/document/7415826 |
DOI | 10.1109/IIH-MSP.2015.58 |
Citation Key | zheng_cyber_2015 |
- IAP software
- standards
- Software
- security of data
- risk management
- risk assessment
- pubcrawl170108
- pubcrawl170107
- protective strategy
- industrial control system
- industrial control
- industrial automation platform
- analytic hierarchy process
- fuzzy set theory
- fuzzy comprehensive evaluation method
- fuzzy analytic hierarchy process
- entropy theory
- Entropy
- cyber security risk assessment
- cyber security
- computer security
- communication links
- communication link risk
- automation