Skip to Main Content
Cybersecurity of Industrial Systems
book

Cybersecurity of Industrial Systems

by Jean-Marie Flaus
July 2019
Intermediate to advanced content levelIntermediate to advanced
420 pages
8h 47m
English
Wiley-ISTE
Content preview from Cybersecurity of Industrial Systems

3 IT Security

3.1. Security objectives

The first part of this chapter introduces what are known as Information Technology (IT) security objectives and details them in the context of the industrial control system (ICS). The second part gives useful, precise definitions concerning the notion of risk. The principle of risk analysis, based on the assessment of impacts and their likelihood, is then described. The last part presents the evaluation process and shows how it fits into the PDCA continuous improvement process (Plan, Do, Check, Act).

The different methods of risk analysis are presented in Chapter 9. The general risk management approach for ICS is detailed in Chapter 11.

3.1.1. The AIC criteria

In the world of information security, we often consider three properties of a system that must be guaranteed: the availability (A) of services, the integrity (I) of software and data and the confidentiality (C) of information. These criteria are called AIC criteria. They are seen as objectives to be achieved by security functions.

The importance of the first criterion, the availability of a service or information, is quite easy to perceive. Everyone can see this when they need a web service from their workstation or mobile phone.

This criterion is more or less important depending on the context and the user: the lack of an available mapping service used to locate a destination mentioned in a documentary will be less problematic than it will be if one is lost in a city, abroad and ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cybersecurity for Industrial Control Systems

Cybersecurity for Industrial Control Systems

Tyson Macaulay, Bryan L. Singer
Handbook of SCADA/Control Systems Security

Handbook of SCADA/Control Systems Security

Robert Radvanovsky, Jacob Brodsky

Publisher Resources

ISBN: 9781786304216Purchase book