A cyber incident response and recovery framework to support operators of ICS and Critical National Infrastructure

Author(s):  
Alexander Staves ◽  
Tom Anderson ◽  
Harry Balderstone ◽  
Benjamin Green ◽  
Antonios Gouglidis ◽  
...  
2012 ◽  
Vol 6 (2) ◽  
pp. 174-181 ◽  
Author(s):  
Merritt Schreiber ◽  
Betty Pfefferbaum ◽  
Lisa Sayegh

ABSTRACTAlthough increasing evidence suggests that children are at particular risk from disasters and evidence-based practices have been developed to triage and treat them effectively, no strategy or concept of operations linking best practices for disaster response is currently in place. To our knowledge, this report describes the first effort to address this critical gap and outlines a triage-driven children's disaster mental health incident response strategy for seamless preparedness, response, and recovery elements that can be used now. The national children's disaster mental health concept of operations (NCDMH CONOPS) details the essential elements needed for an interoperable, coordinated response for the mental health needs of children by local communities, counties, regions, and states to better meet the needs of children affected by disasters and terrorism incidents. This CONOPS for children proposes the use of an evidence-based, rapid triage system to provide a common data metric to incident response and recovery action and to rationally align limited resources to those at greater need in a population-based approach.(Disaster Med Public Health Preparedness. 2012;6:174–181)


2010 ◽  
Author(s):  
Ellen Raber ◽  
Robert Greenwalt ◽  
Wilthea Hibbard ◽  
Don MacQueen ◽  
Sav Mancieri ◽  
...  

Author(s):  
Petar Radanliev ◽  
David Charles De Roure ◽  
Carsten Maple ◽  
Jason R.C. Nurse ◽  
Razvan Nicolescu ◽  
...  

In this paper we present an understanding of cyber risks in the Internet of Things (IoT), we explain why it is important to understand what IoT cyber risks are and how we can use risk assessment and risk management approaches to deal with these challenges. We introduce the most effective ways of doing Risk assessment and Risk Management of IoT risk. As part of our research, we also developed methodologies to assess and manage risk in this emerging environment.  This paper will take you through our research and we will explain: what we mean by the IoT; what we mean by risk and risk in the IoT; why risk assessment and risk management are important; the IoT risk management for incident response and recovery; what open questions on IoT risk assessment and risk management remain.


Sign in / Sign up

Export Citation Format

Share Document