Linked e-resources
Details
Table of Contents
Intro
Contents
Contributing Authors
Preface
I THEMES AND ISSUES
Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS
1. Introduction
2. Related Work
2.1 Cyber Infrastructure Threats
2.2 Cyber Infrastructure Resilience
3. Cyber Infrastructure and Threats
3.1 Cyber Infrastructure Model
3.2 Cyber Infrastructure Threats
4. National-Scale Resilience Model
4.1 Cyber Infrastructure and Resilience
4.2 Basic Resilience Model
4.3 Applying Resilience to Cyber Infrastructure
4.4 Measuring Practices in Cyber Infrastructure
5. Implementing the Resilience Model
5.1 Phase 1: Prepare
5.2 Phase 2: Implement
5.3 Phase 3: Test
5.4 Phase 4: Evaluate
6. Stakeholders and Roles
6.1 Cyber Resilience Government Stakeholders
6.2 Building Cyber Infrastructure Resilience
7. Conclusions
References
Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS?
1. Introduction
2. Background
2.1 Advanced Metering System Evolution
2.2 European Union Cyber Security Legislation
3. Research Methodology Overview
4. Reference Model
5. Framework to Legislation Mapping
6. Cloud-Secure AMS Policy Framework
7. Conclusions
Acknowledgements
References
II INDUSTRIAL CONTROL SYSTEMS SECURITY
Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE
1. Introduction
2. Project Background and Overview
3. Assessment Methodology
4. Research Findings
4.1 Device Command Processing
4.2 IMS/AMS Operator Workstations
4.3 Safety Instrumented SystemCommunications
4.4 Security Control Performance
4.5 Assessment Questions and Findings
4.6 Architecture Comparison
5. Recommendations
6. Discussion
7. Conclusions
Acknowledgements
References
Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH
1. Introduction
2. Related Work
3. Virtualization for Trust and Resilience
3.1 PLC Virtualization
3.2 Remote TPM-Based Attestation
4. Experiments and Results
4.1 Experimental Environment
4.2 Resilience Experiments and Results
5. Conclusions
References
III ADDITIVE MANUFACTURING SYSTEMS
Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS
1. Introduction
2. Additive Manufacturing Workflow
3. Additive Manufacturing Threats
3.1 Threats Leveraging Additive Manufacturing
3.2 Threats Against Additive Manufacturing
4. Material Extrusion Additive Manufacturing
5. Attack-Defense Modeling
6. Material Extrusion Attack-Defense Model
6.1 Design Phase Attack-Defense Model
6.2 Slicing Phase Attack-Defense Model
6.3 Printing Phase Attack-Defense Model
7. Material Extrusion Case Studies
7.1 Printer Annamieke
Contents
Contributing Authors
Preface
I THEMES AND ISSUES
Chapter 1 NATIONAL CYBER RESILIENCE AND ROLES FOR PUBLIC AND PRIVATE SECTOR STAKEHOLDERS
1. Introduction
2. Related Work
2.1 Cyber Infrastructure Threats
2.2 Cyber Infrastructure Resilience
3. Cyber Infrastructure and Threats
3.1 Cyber Infrastructure Model
3.2 Cyber Infrastructure Threats
4. National-Scale Resilience Model
4.1 Cyber Infrastructure and Resilience
4.2 Basic Resilience Model
4.3 Applying Resilience to Cyber Infrastructure
4.4 Measuring Practices in Cyber Infrastructure
5. Implementing the Resilience Model
5.1 Phase 1: Prepare
5.2 Phase 2: Implement
5.3 Phase 3: Test
5.4 Phase 4: Evaluate
6. Stakeholders and Roles
6.1 Cyber Resilience Government Stakeholders
6.2 Building Cyber Infrastructure Resilience
7. Conclusions
References
Chapter 2 ARE EUROPEAN SECURITY POLICIES READY FOR ADVANCED METERING SYSTEMS WITH CLOUD BACK-ENDS?
1. Introduction
2. Background
2.1 Advanced Metering System Evolution
2.2 European Union Cyber Security Legislation
3. Research Methodology Overview
4. Reference Model
5. Framework to Legislation Mapping
6. Cloud-Secure AMS Policy Framework
7. Conclusions
Acknowledgements
References
II INDUSTRIAL CONTROL SYSTEMS SECURITY
Chapter 3 IMPORTANCE OF CYBER SECURITY ANALYSIS IN THE OPERATIONAL TECHNOLOGY SYSTEM LIFECYCLE
1. Introduction
2. Project Background and Overview
3. Assessment Methodology
4. Research Findings
4.1 Device Command Processing
4.2 IMS/AMS Operator Workstations
4.3 Safety Instrumented SystemCommunications
4.4 Security Control Performance
4.5 Assessment Questions and Findings
4.6 Architecture Comparison
5. Recommendations
6. Discussion
7. Conclusions
Acknowledgements
References
Chapter 4 TRUSTED VIRTUALIZATION-BASED PROGRAMMABLE LOGIC CONTROLLER RESILIENCE USING A BACKFIT APPROACH
1. Introduction
2. Related Work
3. Virtualization for Trust and Resilience
3.1 PLC Virtualization
3.2 Remote TPM-Based Attestation
4. Experiments and Results
4.1 Experimental Environment
4.2 Resilience Experiments and Results
5. Conclusions
References
III ADDITIVE MANUFACTURING SYSTEMS
Chapter 5 ATTACK-DEFENSE MODELING OF MATERIAL EXTRUSION ADDITIVE MANUFACTURING SYSTEMS
1. Introduction
2. Additive Manufacturing Workflow
3. Additive Manufacturing Threats
3.1 Threats Leveraging Additive Manufacturing
3.2 Threats Against Additive Manufacturing
4. Material Extrusion Additive Manufacturing
5. Attack-Defense Modeling
6. Material Extrusion Attack-Defense Model
6.1 Design Phase Attack-Defense Model
6.2 Slicing Phase Attack-Defense Model
6.3 Printing Phase Attack-Defense Model
7. Material Extrusion Case Studies
7.1 Printer Annamieke