scholarly journals Modeling scenarios of extreme situations in the energy sector caused by cyber threats

2021 ◽  
Vol 289 ◽  
pp. 03005
Author(s):  
Daria A. Gaskova ◽  
Aleksei G. Massel

The paper considers the violation of cybersecurity as a possibility of a real impact (intentional or accidental) from cyberspace on the physical infrastructure of a digital energy facility. In energy security studies, such impacts are considered as extreme situations, including critical and emergency situations. A model of scenarios of extreme situations in the energy sector caused by cyber threats using Bayesian Belief Network and the stages of modeling are considered in more detail. The five main stages are i) modeling cyber threats vectors of intrusion and advance towards the target asset; ii) modeling an attack on a target system in the technological segment of the local area network; iii) modeling technogenic threats to energy security caused by cyber threats; iv) modeling consequences at the level of the facility system; v) modeling consequences at the level of the infrastructure. This approach allows one to build cause and effect relationships from vulnerabilities in the cyber environment to the consequences. Modeling stages are aimed at increasing the level of cyber situational awareness, which, in turn, related with energy security issues.

Author(s):  
Д.А. Гаськова

В статье рассматриваются  результаты исследования ситуационной осведомленности в киберсреде энергетических объектов. Для повышения информированности о состоянии киберсреды таких объектов предлагаются модель сценариев экстремальных ситуаций в энергетике на основе байесовской сети доверия и численный метод определения киберситуационной осведомленности. Модель основана на причинно-следственных связях между уязвимостями локальной вычислительной сети (ЛВС) и возможных киберугрозах, представленных в виде векторов проникновения в ЛВС,  векторов развития кибернетических атак и векторов атак на целевой актив, объединённых в сценарии. В работе ставится акцент на сценарии, последствия которых могут расцениваться как экстремальные ситуации в энергетике, вызванные киберугрозами. The article describes the research direction of situational awareness in the cyber environment on energy facilities. A model based on a Bayesian Belief Network and a numerical method for determining cyber situational awareness are proposed to increase awareness of the cyber environment state on such facilities. The model is based on causal relationships between the vulnerabilities of the local area network and possible cyber threats, presented in the form of vectors of penetration into the network, vectors of the development of cyber attacks and attack vectors on the target asset, combined in scenarios. The work focuses on scenarios, the consequences of which can be regarded as extreme situations in the energy sector caused by cyber threats.


2014 ◽  
Vol 687-691 ◽  
pp. 1884-1887
Author(s):  
Yu Dong ◽  
Jun Hua Guo

With the rapid expansion of the rapid development of computer network technology and network coverage, campus network security issues are increasingly complex and outstanding looks up. In this paper, we have the analysis of the campus CAN security situation, put forward the principle of network security policy-making process to be followed, clearly a number of network security policy are also pointed out to build a more complete network security solution ideas. For the current campus CAN security issues, we discuss the principles and methods of the CAN network design process involved in the security system, and propose specific means for the campus CAN technology features. Meanwhile, we have researched and explored the characteristics and design of school network management, combined with the existence of the campus local area network insecurity, indicated security needs of the campus network, and to developed appropriate the security policy of campus network.


Author(s):  
CHRISTINE STRAUSS ◽  
CHRISTIAN STUMMER

Security issues in information management are increasingly moving towards the centre of corporate interests. This paper presents a multiobjective modelling approach that interactively assists IT managers in their attempts to reduce a given risk by evaluating and selecting portfolios (i.e. bundles) of security measures. The proposed multi-step procedure identifies attractive portfolio candidates and finally establishes the "best" one with respect to the decision-maker's preferences. Our model and its possible application are demonstrated by means of a numerical example based on real-world data that evaluates the risk of hacking faced by a Local Area Network in an academic environment.


Author(s):  
Cristinel Marius VASILE

Today, most businesses are based on a computer system, more or less developed. For daily activities the organization needs to be able to connect to the Internet, possibly from a local area network (LAN). But, once with the benefits of the Internet, there are also security risks that the organization must minimize by measures and appropriate controls. Among security issues arising from using the Internet include hacker attacks, computers infection with viruses, malware and spyware. In theory, hackers can enter inside the organization network and steal confidential data, damaging computers or the entire organization's local area network. In this sense, firewall implementation is a security measure needed to any organization. This paper presents firewall types and technologies, attacks on firewalls and some security measures on the internal network.


1981 ◽  
Vol 1 (1) ◽  
pp. 21 ◽  
Author(s):  
David Hutchison ◽  
Doug Shepherd

1991 ◽  
Vol 30 (01) ◽  
pp. 53-64 ◽  
Author(s):  
R. Schosser ◽  
C. Weiss ◽  
K. Messmer

This report focusses on the planning and realization of an interdisciplinary local area network (LAN) for medical research at the University of Heidelberg. After a detailed requirements analysis, several networks were evaluated by means of a test installation, and a cost-performance analysis was carried out. At present, the LAN connects 45 (IBM-compatible) PCs, several heterogeneous mainframes (IBM, DEC and Siemens) and provides access to the public X.25 network and to wide-area networks for research (EARN, BITNET). The network supports application software that is frequently needed in medical research (word processing, statistics, graphics, literature databases and services, etc.). Compliance with existing “official” (e.g., IEEE 802.3) and “de facto” standards (e.g., PostScript) was considered to be extremely important for the selection of both hardware and software. Customized programs were developed to improve access control, user interface and on-line help. Wide acceptance of the LAN was achieved through extensive education and maintenance facilities, e.g., teaching courses, customized manuals and a hotline service. Since requirements of clinical routine differ substantially from medical research needs, two separate networks (with a gateway in between) are proposed as a solution to optimally satisfy the users’ demands.


Author(s):  
Chaithra. H. U ◽  
Vani H.R

Now a days in Wireless Local Area Networks (WLANs) used in different fields because its well-suited simulator and higher flexibility. The concept of WLAN  with  advanced 5th Generation technologies, related to a Internet-of-Thing (IOT). In this project, representing the Network Simulator (NS-2) used linked-level simulators for Wireless Local Area Networks and still utilized IEEE 802.11g/n/ac with advanced IEEE 802.11ah/af technology. Realization of the whole Wireless Local Area Networking linked-level simulators inspired by the recognized Vienna Long Term Evolution- simulators. As a outcome, this is achieved to link together that simulator to detailed performances of Wireless Local Area Networking with Long Term Evolution, operated in the similar RF bands. From the advanced 5th Generation support cellular networking, such explore is main because different coexistences scenario can arise linking wireless communicating system to the ISM and UHF bands.


Sign in / Sign up

Export Citation Format

Share Document