In recent years, critical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation and assessment of security threats to information systems of industrial critical infrastructures. The description of the approach is followed with a presentation of the supporting hardware and software architecture.JRC.G.6-Sensors, radar technologies and cybersecurit
Complex networked systems have become an integral part of our supply infrastructure. Mobile devices,...
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is r...
The scope of cyber security becomes wider and wider with time and cyber threats rapidly change. This...
The security assessment of the ICT components of critical infrastructures is nowadays a prominent pr...
This paper addresses the issue of the security of critical energy infrastructures and aims at mergin...
Critical infrastructures and systems are today exposed not only to traditional safety and availabili...
The pervasive use of the information and communication technologies (ICT) in Critical Infrastructure...
Industry, in parallel with a pervasive use of information and communication technologies, has begun...
A relatively new trend in Critical Infrastructures (e.g. power plants, nuclear plants, energy grids ...
Interest in security assessment and penetration testing techniques has steadily increased. Likewise,...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The connectivity advances in industrial control systems have also increased the possibility of cyber...
The newly discovered threats on Networked Critical Infrastructures (NCIs), e.g. the power grid, incl...
Industry has begun in the last years to take into consideration the use of Public Information Infras...
Complex networked systems have become an integral part of our supply infrastructure. Mobile devices,...
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is r...
The scope of cyber security becomes wider and wider with time and cyber threats rapidly change. This...
The security assessment of the ICT components of critical infrastructures is nowadays a prominent pr...
This paper addresses the issue of the security of critical energy infrastructures and aims at mergin...
Critical infrastructures and systems are today exposed not only to traditional safety and availabili...
The pervasive use of the information and communication technologies (ICT) in Critical Infrastructure...
Industry, in parallel with a pervasive use of information and communication technologies, has begun...
A relatively new trend in Critical Infrastructures (e.g. power plants, nuclear plants, energy grids ...
Interest in security assessment and penetration testing techniques has steadily increased. Likewise,...
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as su...
The analysis of the impact on the ecology of the state of cybersecurity of critical infrastructure o...
The connectivity advances in industrial control systems have also increased the possibility of cyber...
The newly discovered threats on Networked Critical Infrastructures (NCIs), e.g. the power grid, incl...
Industry has begun in the last years to take into consideration the use of Public Information Infras...
Complex networked systems have become an integral part of our supply infrastructure. Mobile devices,...
Critical Infrastructures are nowadays exposed to new kind of threats. The cause of such threats is r...
The scope of cyber security becomes wider and wider with time and cyber threats rapidly change. This...