www.osti.gov Open in urlscan Pro
192.107.175.222  Public Scan

Submitted URL: https://www.osti.gov/servlets/purl/1505628
Effective URL: https://www.osti.gov/biblio/1505628
Submission: On June 28 via manual from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST /search

<form action="/search" id="search_form" class="pure-form" method="POST" autocomplete="off">
  <input type="hidden" id="index_search_act" name="act" value="act">
  <input type="hidden" id="index_search_rows" name="rows" value="">
  <input type="hidden" id="index_search_page" name="page" value="">
  <input type="hidden" id="index_search_sort" name="sort" value="">
  <input type="hidden" id="search_journal_type" name="journal_type" value="">
  <input type="hidden" id="search_data_type" name="data_type" value="">
  <input type="hidden" id="search_availability" name="availability" value="">
  <div style="padding: 0.7em 0 0.5em;">
    <div class="row">
      <div class="col-11">
        <div style="position:relative;">
          <label class="sr-only" for="search_search">Search terms:</label>
          <input class="pure-input-1" id="search_search" type="text" name="search" value="" placeholder="Search 3+ million Department of Energy research results">
          <button type="button" class="close-advformoptions" aria-hidden="true" title="Advanced search options"
            style="position: absolute; top: 7px; right: 5px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342; font-size: 1.3rem; margin-top: -0.15rem;"><span class="fa fa-caret-down"></span><span class="sr-only">Advanced
              search options</span></button>
          <div id="adv-search" style="background-color:#f9f9f9; border:1px solid #444; padding:20px; position:absolute; left:0; right: 0; top: 38px; display:none; z-index:2000;">
            <fieldset class="small" style="padding-bottom:0;">
              <legend style="padding:0px; margin-bottom:1em;">
                <div class="pull-right">
                </div> Advanced Search Options<small style="display:block;color:#999;">Advanced Search queries use a traditional Term Search. For more info, see our <a href="/faqs#faq-270584">FAQ</a>.</small>
              </legend>
              <div class="adv_search-row">
                <label for="search_term">All Fields: </label>
                <input class="pure-input-1" type="text" name="term" id="search_term" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_title">Title: </label>
                <input class="pure-input-1" type="text" name="title" id="search_title" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_creators">Author / Contributor: </label>
                <input class="pure-input-1" type="text" name="creators" id="search_creators" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_doi">Digital Object Identifier (DOI): </label>
                <input class="pure-input-1" type="text" name="doi" id="search_doi" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_idnos">Identifier Numbers: </label>
                <input class="pure-input-1" type="text" name="idnos" id="search_idnos" value="">
              </div>
              <div class="adv_search-row">
                <label for="search_pubd_from">Publication Date: </label>
                <div style="/* white-space: nowrap; */">
                  <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_from" name="pubd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                    placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                  <label for="search_pubd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
                  <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_pubd_until" name="pubd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                    placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                </div>
              </div>
            </fieldset>
            <fieldset class="small" style="padding-bottom:0; margin-top:20px;">
              <legend style="padding:0px; margin-bottom:1em;"><a href="#" id="search_search-moreoptions"><span id="more-options-indicator" class="fa fa-plus-squared-alt"></span> More Options ...</a></legend>
              <div id="more-options-container" class="hidden">
                <div class="adv_search-row">
                  <label for="search_fulltext">Full Text: </label>
                  <input class="pure-input-1" type="text" name="fulltext" id="search_fulltext" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_product_type">Resource Type: </label>
                  <div style="position:relative;" data-jq-dropdown="#product_type_dropdown">
                    <input class="pure-input-1" type="text" name="product_type" id="search_product_type" value="" style="-webkit-user-select: none; -moz-user-select: none; -ms-user-select: none; user-select: none;">
                    <span style="position: absolute; top: 8px; right: 10px; z-index: 2;cursor: pointer; background: transparent; border: 0; color:#7cb342;"><span class="fa fa-caret-down"></span></span>
                  </div>
                  <div style="position:relative;">
                    <div id="product_type_dropdown" class="jq-dropdown jq-dropdown-tip jq-dropdown-relative" style="width:100%;">
                      <div class="jq-dropdown-panel">
                        <div class="row" style="display:flex;">
                          <div class="col-lg-6 col-md-12 jqd-col">
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Journal Article <input type="checkbox" name="product_type_option" title="Journal Article" value="Journal Article">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Technical Report <input type="checkbox" name="product_type_option" title="Technical Report" value="Technical Report">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Data <input type="checkbox" name="product_type_option" title="Data" value="Data">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Software <input type="checkbox" name="product_type_option" title="Software" value="Software">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Patent <input type="checkbox" name="product_type_option" title="Patent" value="Patent">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Conference / Event <input type="checkbox" name="product_type_option" title="Conference / Event" value="Conference">
                              <div class="control-indicator"></div>
                            </label>
                          </div>
                          <div class="col-lg-6 col-md-12 jqd-col">
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Book / Monograph <input type="checkbox" name="product_type_option" title="Book / Monograph" value="Book">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Program Document <input type="checkbox" name="product_type_option" title="Program Document" value="Program Document">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox" style="white-space: nowrap;">Thesis / Dissertation <input type="checkbox" name="product_type_option" title="Thesis / Dissertation" value="Thesis/Dissertation">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Video / Audio <input type="checkbox" name="product_type_option" title="Video / Audio" value="Multimedia">
                              <div class="control-indicator"></div>
                            </label>
                            <label class="facet-item control control-checkbox">Miscellaneous <input type="checkbox" name="product_type_option" title="Miscellaneous" value="Miscellaneous">
                              <div class="control-indicator"></div>
                            </label>
                          </div>
                        </div>
                      </div>
                    </div>
                  </div>
                </div>
                <div class="adv_search-row">
                  <label for="search_subject">Subject: </label>
                  <input class="pure-input-1" type="text" name="subject" id="search_subject" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_site_code">Site: </label>
                  <select class="pure-input-1" name="site_code" id="search_site_code">
                    <option value="">All</option>
                  </select>
                </div>
                <div class="adv_search-row">
                  <label for="search_research_org">Research Org: </label>
                  <input class="pure-input-1" type="text" name="research_org" id="search_research_org" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_sponsor_org">Sponsoring Org: </label>
                  <input class="pure-input-1" type="text" name="sponsor_org" id="search_sponsor_org" value="">
                </div>
                <div class="adv_search-row">
                  <label for="search_updd_from">Update Date: </label>
                  <div style="/* white-space: nowrap; */">
                    <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_from" name="updd_from" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                      placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                    <label for="search_updd_until" style="margin-right:0.5rem; margin-left:0.5rem;">to</label>
                    <input type="text" pattern="(0[1-9]|1[012])[/](0[1-9]|[12][0-9]|3[01])[/]\d\d\d\d" id="search_updd_until" name="updd_until" data-toggle="tooltip" data-placement="bottom" title="" class="dateinput pure-u-1-3" value=""
                      placeholder="MM/DD/YYYY" data-original-title="Enter date in MM/DD/YYYY format">
                  </div>
                </div>
                <div class="adv_search-row">
                  <label class="control control-checkbox">Limit to INIS / NSA records only <input type="checkbox" id="search_inis_nsa" name="inis_nsa" title="Limit to INIS / NSA records only" value="true">
                    <div class="control-indicator"></div>
                  </label>
                </div>
                <div class="adv_search-row">
                  <label class="control control-checkbox">Limit to Nobel Prize winning researchers only <input type="checkbox" id="search_nobel" name="nobel" title="Limit to Nobel Prize winning researchers only" value="true">
                    <div class="control-indicator"></div>
                  </label>
                </div>
                <hr>
              </div>
            </fieldset>
            <div class="text-right">
              <button type="submit" class="pure-button button-success" style="margin: 1px; margin-left: 5px; padding:0.5em 0.9em;"><span class="fa fa-search"></span> Search</button>
            </div>
          </div>
        </div>
      </div>
      <div class="col-1">
        <button type="submit" class="pure-input-1 pure-button button-search" id="search_submit" aria-hidden="true" title="Submit"><span class="fa fa-search"></span><span class="sr-only">Submit</span></button>
      </div>
    </div>
  </div>
</form>

POST /search

<form action="/search" id="state_form" method="POST" autocomplete="off">
  <input type="hidden" id="state_act" name="act" value="act">
  <input type="hidden" id="state_rows" name="rows" value="10">
  <input type="hidden" id="state_page" name="page" value="">
  <input type="hidden" id="state_sort" name="sort" value="">
  <input type="hidden" id="state_return_type" name="return_type" value="">
  <input type="hidden" id="state_search" name="search" value="">
  <input type="hidden" id="state_term" name="term" value="">
  <input type="hidden" id="state_title" name="title" value="">
  <input type="hidden" id="state_creators" name="creators" value="">
  <input type="hidden" id="state_doi" name="doi" value="">
  <input type="hidden" id="state_idnos" name="idnos" value="">
  <input type="hidden" id="state_pubd_from" name="pubd_from" value="">
  <input type="hidden" id="state_pubd_until" name="pubd_until" value="">
  <input type="hidden" id="state_fulltext" name="fulltext" value="">
  <input type="hidden" id="state_doe_contract_number" name="doe_contract_number" value="">
  <input type="hidden" id="state_product_type" name="product_type" value="">
  <input type="hidden" id="state_journal_type" name="journal_type" value="">
  <input type="hidden" id="state_data_type" name="data_type" value="">
  <input type="hidden" id="state_software_type" name="software_type" value="">
  <input type="hidden" id="state_software_license" name="software_license" value="">
  <input type="hidden" id="state_subject" name="subject" value="">
  <input type="hidden" id="state_site_code" name="site_code" value="">
  <input type="hidden" id="state_research_org" name="research_org" value="">
  <input type="hidden" id="state_sponsor_org" name="sponsor_org" value="">
  <input type="hidden" id="state_updd_from" name="updd_from" value="">
  <input type="hidden" id="state_updd_until" name="updd_until" value="">
  <input type="hidden" id="state_availability" name="availability" value="">
  <input type="hidden" id="state_inis_nsa" name="inis_nsa" value="">
  <input type="hidden" id="state_nobel" name="nobel" value="">
  <button type="submit" style="display:none;" aria-hidden="true" title="Submit">
  </button>
</form>

Text Content

skip to main content
 * Sign In
 * Create Account

Show search Show menu
U.S. Department of Energy
Office of Scientific and Technical Information
Search terms: Advanced search options

Advanced Search OptionsAdvanced Search queries use a traditional Term Search.
For more info, see our FAQ.
All Fields:
Title:
Author / Contributor:
Digital Object Identifier (DOI):
Identifier Numbers:
Publication Date:
to
More Options ...
Full Text:
Resource Type:

Journal Article

Technical Report

Data

Software

Patent

Conference / Event

Book / Monograph

Program Document

Thesis / Dissertation

Video / Audio

Miscellaneous

Subject:
Site: All
Research Org:
Sponsoring Org:
Update Date:
to
Limit to INIS / NSA records only

Limit to Nobel Prize winning researchers only


--------------------------------------------------------------------------------

Search
Submit

 * Submit Research Results
 * Search Tools
 * Public Access Policy
 * PIDs Services & Dev Tools
 * About
 * FAQs
 * News
 * Sign In
 * Create Account

OSTI.GOV Technical Report: History of Industrial Control System Cyber Incidents


TITLE: HISTORY OF INDUSTRIAL CONTROL SYSTEM CYBER INCIDENTS

 * Full Record
 * Other Related Research

×

You are accessing a document from the Department of Energy's (DOE) OSTI.GOV.
This site is a product of DOE's Office of Scientific and Technical Information
(OSTI) and is provided as a public service.

Visit OSTI to utilize additional information resources in energy science and
technology.


ABSTRACT

For many years malicious cyber actors have been targeting the industrial control
systems (ICS) that manage our critical infrastructures. Most of these events are
not reported to the public, and the threats and incidents to ICS are not as
well-known as enterprise cyber threats and incidents. This paper is a brief
study of publically reported cyber threats to critical infrastructure that sheds
light on the growing cyber threats to ICS devices. It is important to note that
this list is not all inclusive. The events selected in this study highlight the
significant threats and incidents to industrial control systems and demonstrate
that significant cyber incidents to ICS devices are growing and becoming more
complex.


Authors: Hemsley, Kevin E. [1]; E. Fisher, Dr. Ronald  [2]
 * Search OSTI.GOV for author "E. Fisher, Dr. Ronald"
 * Search OSTI.GOV for ORCID "0000-0002-7782-1830"
 * Search orcid.org for ORCID "0000-0002-7782-1830"

--------------------------------------------------------------------------------

+ Show Author Affiliations
 1. Idaho National Lab. (INL), Idaho Falls, ID (United States)
 2. Idaho National Lab. (INL), Idaho Falls, ID (United States

Publication Date: 2018-12-31 Research Org.: Idaho National Lab. (INL), Idaho
Falls, ID (United States) Sponsoring Org.: USDOE Office of Nuclear Energy (NE)
OSTI Identifier: 1505628 Report Number(s): INL/CON-18-44411-Rev002 DOE Contract
Number:   AC07-05ID14517 Resource Type: Technical Report Country of Publication:
United States Language: English Subject: 99 GENERAL AND MISCELLANEOUS;
Industrial Control Systems; Cybersecurity; Threats

--------------------------------------------------------------------------------


CITATION FORMATS

 * MLA
 * APA
 * Chicago
 * BibTeX

Hemsley, Kevin E., and E. Fisher, Dr. Ronald. History of Industrial Control
System Cyber Incidents. United States: N. p., 2018. Web. doi:10.2172/1505628.
Copy to clipboard
Hemsley, Kevin E., & E. Fisher, Dr. Ronald. History of Industrial Control System
Cyber Incidents. United States. https://doi.org/10.2172/1505628
Copy to clipboard
Hemsley, Kevin E., and E. Fisher, Dr. Ronald. 2018. "History of Industrial
Control System Cyber Incidents". United States. https://doi.org/10.2172/1505628.
https://www.osti.gov/servlets/purl/1505628.
Copy to clipboard
@article{osti_1505628,
title = {History of Industrial Control System Cyber Incidents},
author = {Hemsley, Kevin E. and E. Fisher, Dr. Ronald},
abstractNote = {For many years malicious cyber actors have been targeting the
industrial control systems (ICS) that manage our critical infrastructures. Most
of these events are not reported to the public, and the threats and incidents to
ICS are not as well-known as enterprise cyber threats and incidents. This paper
is a brief study of publically reported cyber threats to critical infrastructure
that sheds light on the growing cyber threats to ICS devices. It is important to
note that this list is not all inclusive. The events selected in this study
highlight the significant threats and incidents to industrial control systems
and demonstrate that significant cyber incidents to ICS devices are growing and
becoming more complex.},
doi = {10.2172/1505628},
url = {https://www.osti.gov/biblio/1505628}, journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {12}
}
Copy to clipboard

--------------------------------------------------------------------------------

Technical Report:
View Technical Report (0.60 MB)
https://doi.org/10.2172/1505628

--------------------------------------------------------------------------------

Save / Share:
Export Metadata
 * Endnote
 * RIS
 * CSV / Excel
 * XML
 * JSON

Save to My Library
You must Sign In or Create an Account in order to save documents to your
library.
 * Facebook
 * Twitter
 * Email
 * Print
 * More share options
    * LinkedIn
    * Pinterest
    * Tumblr

Similar records in OSTI.GOV collections:


 * EVOLUTION AND TRENDS OF INDUSTRIAL CONTROL SYSTEM CYBER INCIDENTS SINCE 2017
   
   Journal Article Grubbs, Robert; Stoddard, Jeremiah; Freeman, Sarah; ... -
   Journal of Critical Infrastructure Policy
   The industrial control systems (ICSs) that manage our critical infrastructure
   are increasingly converging with corporate networks and the Internet as
   technology and businesses prioritize digital connectivity. These connections
   make them more vulnerable and available to malicious cyber actors who
   traditionally targeted the companies’ more public-facing information
   technology (IT) networks. This paper will review select publicly reported
   cyber incidents to highlight the continued and growing threat to ICS devices
   and operational technology (OT) environments. It will summarize the incident
   and when available, will provide information on the cyber actors, the
   vulnerabilities they exploited, and any publications the U.S. Government
   (USG) providedmore » in response. Data belonging to the Department of
   Homeland Security (DHS) will be used to highlight quantitative trends
   concerning ICS incidents. This paper builds on “History of Industrial Control
   System Cyber Incidents” (Hemsley & Fisher 2018), a paper that highlighted
   select noteworthy threats and incidents to ICS systems up to 2017. This paper
   will similarly review select incidents occurring after the last previously
   reviewed incident, Triton/HatMan, December 2017, and will note ICS incident
   trends including IT/OT convergence and advances in cyber-threat actors’
   capabilities in observed in the examined incidents.« less
    * https://doi.org/10.18278/jcip.2.2.4
    * Full Text Available
   
   


 * GUIDE FOR CYBER ASSESSMENT OF INDUSTRIAL CONTROL SYSTEMS FIELD DEVICES.
   
   Technical Report Stamp, Jason; Stinebaugh, Jennifer; Fay, Daniel
   Programmable logic controllers (PLCs) and other field devices are important
   components of many weapons platforms, including vehicles, ships, radar
   systems, etc. Many have significant cyber vulnerabilities that lead to
   unacceptable risk. Furthermore, common procedures used during Oper- ational
   Test and Evaluation (OT&E) may unexpectedly lead to unsafe or severe impacts
   for the field devices or the underlying physical process. This document
   describes an assessment methodology that addresses vulnerabilities,
   mitigations, and safe OT&E. Acknowledgements The authors would like to
   acknowledge the funding and technical support from the Office of the
   Director, Operational Test and Evaluation (DOT&E) for the development of
   thismore » paper. Also, there were key contributions by other Sandia National
   Laboratories (SNL) personnel supporting the analysis, particularly from Mitch
   Martin, Tricia Schulz, Chris Davis, and Nick Pattengale, and from Pacific
   Northwest National Laboratory (PNNL), especially Chris Bonebrake, Jim Brown,
   and Katy Bragg. Executive Summary Industrial control system (ICS) field
   devices like PLCs play a critical role in the safe and reliable operation of
   Department of Defense (DOD) platforms and weapon systems operations. Unfor-
   tunately, these sorts of devices are often rife with cyber security
   vulnerabilities that can lead to significant risks for mission performance,
   or even unsafe conditions during routine OT&E. The cyber security issues
   faced by ICS differ from typical information technology (IT), and this re-
   quires a different and more specific approach to assess, test, and mitigate
   ICS vulnerabilities. In a typical IT system, data confidentiality and
   integrity are the primary concerns. In an ICS, mission operations, safety,
   public health, and avoiding equipment damage are the primary con- cerns. ICS
   devices directly control time critical processes and have little margin for
   delay. Outages or interruptions (even something as simple as a reboot) might
   not be acceptable, and if unplanned can result in significant risk to
   mission. Unlike IT system updates or patches, which can be done using
   automated server-based tools and are widely applicable, ICS updates are
   specific to the equipment vendor. OT&E on ICS field devices (on deployed
   platforms, or in high value test rigs) is often a neces- sary requirement,
   but this causes significant concern within the DOD ICS community. The concern
   is that implementing routine cyber security measures and testing on active
   ICS components and systems may damage the ICS or even underlying physical
   systems. Of particular concern are ICS field devices, which encompasses the
   specialized hardware that covers the boundary between the cyber and physical
   domains. Examples of field devices include PLCs, electric power relays,
   remote terminal units (RTUs), and other embedded devices. According to an
   Office of the Secretary of Defense (OSD) memorandum regarding "Proce- dures
   for Operational Test and Evaluation of Cybersecurity in Acquisition
   Programs," operational test agencies (OTAs) will "include cyber threats...
   with the same rigor as other threats" [1]. The purpose of cyber security
   operational test and evaluation is to evaluate the ability of a unit equipped
   with a system to support assigned missions in the expected environment. The
   "system" in this case is considered to encompass hardware, software, user
   operators, etc. This memorandum also spec- ifies the procedures to be used
   for testing oversight systems. The purpose of this docuemnt is to introduce a
   Field Device Assessment Methodology (FDAM) that parallels (with some
   differences due to the focus on ICS hardware and not the entire system) the
   procedures suggested in the mem- orandum. The FDAM approach is not intended
   to cover the entire oversight system as referenced in the memorandum; rather,
   it explains the procedures necessary to evaluate the ICS hardware devices.
   This focused approach on the hardware subset of the system is warranted
   because ICS field devices face very different issues than IT systems, and the
   risks associated with ICS cyber vulnerabilities can be significant. The goals
   of the FDAM are to research and rank field device vulnerabilities to be
   tested, sum- marize associated mitigations, and determine cyber test concerns
   by summarizing potential OT&E test damage/safety issues. The FDAM primarily
   supports the cooperative assessment stage of OT&E, although the results can
   also support adversarial assessments. This document provides guidance on
   tools and procedures that have been developed by SNL that are used to
   implement the FDAM approach, including an assessment framework, quantitative
   risk calculation, and ranked access/procedure pairs (APPs). The FDAM process
   itself is presented in Chapters through -- from initial research and
   discovery, to standalone lab testing, through to compiling the final report.
   It should be noted that because cyber security testing is inherently complex
   and detail-oriented, those performing the tests will generally have a wealth
   of knowledge and experience that is dif- ficult to fully document or simplify
   into a step by step process. In every testing situation, the background of
   the testers may influence how they choose to implement the process, and in
   which order. Although this document is presented as a logical process, it is
   not necessary to follow every step in the document as laid out. For example,
   a tester that is intimately familiar with ICS systems might choose to do the
   literature review and vulnerability scoring in conjunction with lab testing.
   Or, if project resources are limited, the best choice might be to do only a
   literature review and risk scoring without standalone lab testing or even a
   device teardown. The FDAM is intended to support OTAs, cyber protection teams
   (CPTs), and other organiza- tions within DOD that support OT&E on weapons
   platforms and systems, but it can also be applied to ICS used within DOD
   installations and other bases, particularly for infrastructure support. The
   DOT&E FDAM is applicable for mission platforms, which are heavily reliant on
   ICS, including naval shipboard systems (electrical plant management,
   machinery control, aircraft launch/recovery, radar, fire control, and
   others), advanced ground vehicle management, and aircraft/avionics. The FDAM
   also supports a range of DOD assessment requirements [2, 3] and the approach
   is suitable to varying classification levels, as application details and
   close-held government information can be included when desirable (and
   useful).« less
    * https://doi.org/10.2172/1494181
    * Full Text Available
   
   


 * CYBER THREAT AND VULNERABILITY ANALYSIS OF THE U.S. ELECTRIC SECTOR
   
   Technical Report Glenn, Colleen; Sterbentz, Dane; Wright, Aaron
   With utilities in the U.S. and around the world increasingly moving toward
   smart grid technology and other upgrades with inherent cyber vulnerabilities,
   correlative threats from malicious cyber attacks on the North American
   electric grid continue to grow in frequency and sophistication. The potential
   for malicious actors to access and adversely affect physical electricity
   assets of U.S. electricity generation, transmission, or distribution systems
   via cyber means is a primary concern for utilities contributing to the bulk
   electric system. This paper seeks to illustrate the current cyber-physical
   landscape of the U.S. electric sector in the context of its vulnerabilities
   to cyber attacks,more » the likelihood of cyber attacks, and the impacts
   cyber events and threat actors can achieve on the power grid. In addition,
   this paper highlights utility perspectives, perceived challenges, and
   requests for assistance in addressing cyber threats to the electric sector.
   There have been no reported targeted cyber attacks carried out against
   utilities in the U.S. that have resulted in permanent or long term damage to
   power system operations thus far, yet electric utilities throughout the U.S.
   have seen a steady rise in cyber and physical security related events that
   continue to raise concern. Asset owners and operators understand that the
   effects of a coordinated cyber and physical attack on a utility’s operations
   would threaten electric system reliability–and potentially result in large
   scale power outages. Utilities are routinely faced with new challenges for
   dealing with these cyber threats to the grid and consequently maintain a set
   of best practices to keep systems secure and up to date. Among the greatest
   challenges is a lack of knowledge or strategy to mitigate new risks that
   emerge as a result of an exponential rise in complexity of modern control
   systems. This paper compiles an open-source analysis of cyber threats and
   risks to the electric grid, utility best practices for prevention and
   response to cyber threats, and utility suggestions about how the federal
   government can aid utilities in combating and mitigating risks.« less
    * https://doi.org/10.2172/1337873
    * Full Text Available
   
   


 * CONCEPT FOR CYBER-PHYSICAL CONSEQUENCE PROCESS
   
   Technical Report Rieger, Craig; O'Brien, Barry; Barnes, Kevin; ...
   The Department of Homeland Security’s Office of Cyber and Infrastructure
   Analysis (DHS/OCIA) has a mission and vision that promotes innovation as
   central to expanding the organization’s capability to conduct consequence
   analysis. To pursue such innovation, OCIA is sponsoring a seedling effort
   with Idaho National Laboratory (INL) to leverage data from the proposed
   Automated Vulnerability Assessment (AVA) capability, which the DHS Science
   and Technology (S&T) Directorate is developing through a separate INL effort.
   The first phase of this effort is to develop a process by which recognized
   vulnerabilities can be scored relative to importance, reflected primarily in
   the ability to initiatemore » high consequence and potentially cascading
   events. This report documents a cyber-physical metrics process (CPMP) to tie
   physical impact to the malicious exploitation of cyber vulnerabilities in
   industrial control systems (ICS) with the potential for initiating
   consequence in the critical infrastructure. The scale of achieving any
   particular physical consequence is dependent upon the ICS Component the
   vulnerability exists on, the Level of Access that the exploit would allow to
   component function and the Physical Impact (CLAPI) to the power system that
   the component is tied. A modified common vulnerability scoring system (CVSS)
   was detailed and demonstrated for the power sector with three case studies
   associated with a recognized vulnerability, with significant consequence
   detail provided to apply the process across the power sector. A detailed
   table that provides background on the power system components, ICS-enabled
   monitoring and control, potential consequence effects, and CVSS scoring is
   provided. To demonstrate the applicability of the CPMP, tables are provided
   as examples for other sectors that include chemical, water/wastewater and
   oil/gas.« less
    * https://doi.org/10.2172/1482997
    * Full Text Available
   
   


 * DOE/DHS INDUSTRIAL CONTROL SYSTEM CYBER SECURITY PROGRAMS: A MODEL FOR USE IN
   NUCLEAR FACILITY SAFEGUARDS AND SECURITY
   
   Conference Anderson, Robert; Bjornard, Trond; Schanfein, Mark; ...
   Many critical infrastructure sectors have been investigating cyber security
   issues for several years especially with the help of two primary government
   programs. The U.S. Department of Energy (DOE) National SCADA Test Bed and the
   U.S. Department of Homeland Security (DHS) Control Systems Security Program
   have both implemented activities aimed at securing the industrial control
   systems that operate the North American electric grid along with several
   other critical infrastructure sectors (ICS). These programs have spent the
   last seven years working with industry including asset owners, educational
   institutions, standards and regulating bodies, and control system vendors.
   The programs common mission is tomore » provide outreach, identification of
   cyber vulnerabilities to ICS and mitigation strategies to enhance security
   postures. The success of these programs indicates that a similar approach can
   be successfully translated into other sectors including nuclear operations,
   safeguards, and security. The industry regulating bodies have included cyber
   security requirements and, in some cases, have incorporated sets of standards
   with penalties for non-compliance such as the North American Electric
   Reliability Corporation Critical Infrastructure Protection standards. These
   DOE and DHS programs that address security improvements by both suppliers and
   end users provide an excellent model for nuclear facility personnel concerned
   with safeguards and security cyber vulnerabilities and countermeasures. It is
   not a stretch to imagine complete surreptitious collapse of protection
   against the removal of nuclear material or even initiation of a criticality
   event as witnessed at Three Mile Island or Chernobyl in a nuclear ICS
   inadequately protected against the cyber threat.« less
    * Full Text Available
   
   

 * Similar Records

--------------------------------------------------------------------------------

 * 
 * 
 * 

 * Website Policies / Important Links
 * Contact Us
 * 
 * Vulnerability Disclosure Program
 * 
 * Facebook
 * Twitter
 * YouTube