TY - GEN
T1 - Threat Analysis of Cyber Security Exercise for Reservoir Testbed Based on Attack Tree
AU - Tan, Su Goan
AU - Liu, I-Hsien
AU - Li, Jung Shian
N1 - Funding Information:
ACKNOWLEDGMENT This work was supported by the Water Resources Agency (WRA) under the Ministry of Economic Affairs (MOEA) and the National Science and Technology Council (NSTC) in Taiwan under contract numbers 111-2218-E-006-010-MBK.
Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - As operational technology (OT) and information technology (IT) are getting closer in industrial control systems (ICS) nowadays, the security of critical infrastructure (CI) has become an important issue, which may have a great influence on people's livelihood, economy, and even safety. Therefore, governments around the world have conducted a series of cyber security exercises, which is one of the most effective ways to maintain and optimize the security, so as to cultivate the information security capabilities of government agencies and enterprises in the face of cyber attacks. In this paper, we present the framework and situations of the cyber security exercise with two scenarios on our reservoir testbed, and then analyze the threats based on the attack tree model and give the security recommendations to protect the critical infrastructure according to the results of the practical exercise and analysis.
AB - As operational technology (OT) and information technology (IT) are getting closer in industrial control systems (ICS) nowadays, the security of critical infrastructure (CI) has become an important issue, which may have a great influence on people's livelihood, economy, and even safety. Therefore, governments around the world have conducted a series of cyber security exercises, which is one of the most effective ways to maintain and optimize the security, so as to cultivate the information security capabilities of government agencies and enterprises in the face of cyber attacks. In this paper, we present the framework and situations of the cyber security exercise with two scenarios on our reservoir testbed, and then analyze the threats based on the attack tree model and give the security recommendations to protect the critical infrastructure according to the results of the practical exercise and analysis.
UR - http://www.scopus.com/inward/record.url?scp=85158903200&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85158903200&partnerID=8YFLogxK
U2 - 10.1109/CANDARW57323.2022.00023
DO - 10.1109/CANDARW57323.2022.00023
M3 - Conference contribution
AN - SCOPUS:85158903200
T3 - Proceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022
SP - 375
EP - 379
BT - Proceedings - 2022 10th International Symposium on Computing and Networking Workshops, CANDARW 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 10th International Symposium on Computing and Networking Workshops, CANDARW 2022
Y2 - 21 November 2022 through 22 November 2022
ER -