INHERENTLY SECURE NEXT-GENERATION COMPUTING AND COMMUNICATION NETWORKS FOR REDUCING CASCADING IMPACTS

ROBERT P. EVANS

Idaho National Laboratory, Idaho Falls, Idaho

VIRGIL B. HAMMOND AND SHABBIR A. SHAMSUDDIN

Argonne National Laboratory, Argonne, Illinois

1 INTRODUCTION

Security is of vital interest to all participants in the control system sphere of interest. This includes governmental agencies, vendors, users, and consultants, as well as industry advisory groups. The article explores some of the efforts being used by these participants to identify and mitigate security exposures using risk management methodologies, technology tools, and standards.

2 STANDARDS, GUIDELINES, AND BEST PRACTICES

Standardization has a major impact on each of us, yet most of us do not understand what it means or how it affects our lives. Standardization is the process of establishing a technical benchmark that may be defined by written documents that lay out the criteria for the standardized measure. This technical benchmark document may take one of several forms, depending on its level of acceptance, and can be described as a set of criteria some of which may be mandatory, voluntary guidelines, and/or best practices.

3 STANDARDS

Standards are an important part of the total effort to achieve control system cyber security. As rules or requirements that define accepted operational criteria, they provide a measure of consistency and a means for quantifying quality and reliability. Standards provide a performance ...

Get Wiley Handbook of Science and Technology for Homeland Security, 4 Volume Set now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.