An official website of the European Union How do you know?      
European Commission logo
JRC Publications Repository Menu

Methodology for Experimental ICT Industrial and Critical Infrastructure Security Tests

cover
The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be fed with data regarding the functioning and the behavior of the system under analysis, the potential vulnerabilities, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of security data coming from the field is scarce, mainly due to business confidentiality reasons. Therefore, there is an urgent need for alternative data sources. The solution is to conduct security experiments, with off-line systems or in laboratories with realistic emulation of the target systems. In this paper we present a methodology that defines, step by step, how to conduct, in a systematic and rigorous way, experimental ICT security tests.
2009-06-11
IEEE
JRC48969
http://www2.computer.org/portal/web/csdl/doi/10.1109/ARES.2009.49,    https://publications.jrc.ec.europa.eu/repository/handle/JRC48969,   
10.1109/ARES.2009.49,   
Language Citation
NameCountryCityType
Datasets
IDTitlePublic URL
Dataset collections
IDAcronymTitlePublic URL
Scripts / source codes
DescriptionPublic URL
Additional supporting files
File nameDescriptionFile type 
Show metadata record  Copy citation url to clipboard  Download BibTeX
Items published in the JRC Publications Repository are protected by copyright, with all rights reserved, unless otherwise indicated. Additional information: https://ec.europa.eu/info/legal-notice_en#copyright-notice