Abstract

AbstractIn most modern information systems (IS) and process control systems (PCS), functionality and security are competing design goals. Therefore, system designers and operators are constantly forced to make security‐related trade‐off decisions. To reach the right balance between functionality and security, systems security engineers and network operators have to build information and process control systems that are secure against real‐world cyber attacks without overengineering against any particular one. By understanding which cyber attacks are most likely and which risks are most serious, system designers and operators can make informed security‐related trade‐off decisions.Cyber risk managementis the process of studying the threats, vulnerabilities, and mission impacts of cyber attacks that provides the appropriate metric for trading off between the competing design goals of security and functionality of information and process control systems.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.