Facing Cyber-Physical Security Threats by PSIM-SIEM Integration

Author(s):  
Flavio Frattini ◽  
Ugo Giordano ◽  
Vincenzo Conti
Author(s):  
Rajan R. ◽  
Venkata Subramanian Dayanandan ◽  
Shankar P. ◽  
Ranganath Tngk

A smart city aims at developing an ecosystem wherein the citizens will have instant access to amenities required for a healthy and safe living. Since the mission of smart city is to develop and integrate many facilities, it is envisaged that there is a need for making the information available instantly for right use of such infrastructure. So, there exists a need to design and implement a world-class physical security measures which acts as a bellwether to protect people life from physical security threats. It is a myth that if placing adequate number of cameras alone would enhance physical security controls in smart cities. There is a need for designing and building comprehensive physical security controls, based on the principles of “layered defense-in-depth,” which integrates all aspects of physical security controls. This chapter will review presence of existing physical security technology controls for smart cities in line with the known security threats and propose the need for an AI-enabled physical security premise.


Author(s):  
Ayush Sinha ◽  
Ranjana Vyas ◽  
Venkatesan Subramanian ◽  
O. P. Vyas

Cyber-physical security applied to the domain of critical infrastructure (CI) poses different challenges. To acknowledge the security concern of CI from a cyber-physical perspective becomes imperative since the failure of any one of the CI's components may not only lead to cascading effects, but also the overall services may shut-down state. The energy infrastructure is becoming the backbone in CI due to the complexity of environment, heterogeneous communication technologies, and different configurations of the energy infrastructure, so securing the communication among these devices and control centers becomes a central issue. Many significant works in the related domain has been done. The main focus of the chapter is identification of the attack vector formulation with prevention and detection mechanisms for different components, providing countermeasures cohesively against security threats.


2019 ◽  
Vol 16 (4) ◽  
pp. 82-93
Author(s):  
D. L. Filippov

The article considers the existing methods of risk analysis in the design of physical protection systems. It is noted that in the expert method vulnerability assessed integrally, that does not guarantee the principle of equal strength, vulnerability elements of physical protection are considered without regard to the vulnerability of the object itself, and parameters of the model of the intruder, not taking into account such factors as catalysts and inhibitors of the threat. Noted that to improve the adequacy of physical protection required the formation of a databank of security threats and vulnerabilities.


2021 ◽  
Vol 9 (12) ◽  
pp. 1384
Author(s):  
Iosif Progoulakis ◽  
Paul Rohmeyer ◽  
Nikitas Nikitakos

The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functions that involve multiple and diverse communication paths that are technologically and operationally evolving along with credible cyber security threats. These cyber security threats and risks as well as a number of known security breach scenarios are described in this paper to highlight the evolution of cyber physical systems in the maritime domain and their emerging cyber vulnerabilities. Current industry and governmental standards and directives related to cyber security in the maritime domain attempt to enforce the regulatory compliance and reinforce asset cyber security integrity for optimum and safe performance with limited focus, however, in the existing OT infrastructure and systems. The use of outside-of-the-maritime industry security risk assessment tools and processes, such the API STD 780 Security Risk Assessment (SRA) and the Bow Tie Analysis methodologies, can assist the asset owner to assess its IT and OT infrastructure for cyber and physical security vulnerabilities and allocate proper mitigation measures assuming their similarities to ICS infrastructure. The application of cyber security controls deriving from the adaptation of the NIST CSF and the MITRE ATT&CK Threat Model can further increase the cyber security integrity of maritime assets, assuming they are periodically evaluated for their effectiveness and applicability. Finally, the improvement in communication among stakeholders, the increase in operational and technical cyber and physical security resiliency, and the increase in operational cyber security awareness would be further increased for maritime assets by the convergence of the distinct physical and cyber security functions as well as onshore- and offshore-based cyber infrastructure of maritime companies and asset owners.


2013 ◽  
Vol 347-350 ◽  
pp. 3307-3311
Author(s):  
Yong Huang ◽  
Jian Hua Zhu ◽  
Hui Li

Definition of network security is stated first. Network security threats; roughly including network connection threat, physical environment threat, authentication treat, malicious programs and system vulnerabilities, which can be further divided into more detailed categories. 8 prevention technology and strategies consisting of physical security means, firewall technology, intrusion detection, information encryption technology, vulnerability scanning, antivirus software, disaster recovery technology, and honeypots and honeynet technology are elaborated to try to form a general discussion of the security prevention structure. In the end, we propose that all of these technology and strategies should be organically combined and enterprises should pay more attention to network security rather than expanding production uncontrolled.


2019 ◽  
Vol 22 (4) ◽  
pp. 336-341
Author(s):  
D. V. Ivanov ◽  
D. A. Moskvin

In the article the approach and methods of ensuring the security of VANET-networks based on automated counteraction to information security threats through self-regulation of the network structure using the theory of fractal graphs is provided.


Sign in / Sign up

Export Citation Format

Share Document