153,582 research outputs found

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    Methodologies to develop quantitative risk evaluation metrics

    Get PDF
    The goal of this work is to advance a new methodology to measure a severity cost for each host using the Common Vulnerability Scoring System (CVSS) based on base, temporal and environmental metrics by combining related sub-scores to produce a unique severity cost by modeling the problem's parameters in to a mathematical framework. We build our own CVSS Calculator using our equations to simplify the calculations of the vulnerabilities scores and to benchmark with other models. We design and develop a new approach to represent the cost assigned to each host by dividing the scores of the vulnerabilities to two main levels of privileges, user and root, and we classify these levels into operational levels to identify and calculate the severity cost of multi steps vulnerabilities. Finally we implement our framework on a simple network, using Nessus scanner as tool to discover known vulnerabilities and to implement the results to build and represent our cost centric attack graph

    The Security Rule

    Get PDF

    Implementation of computer assisted assessment: lessons from the literature

    Get PDF
    This paper draws attention to literature surrounding the subject of computer-assisted assessment (CAA). A brief overview of traditional methods of assessment is presented, highlighting areas of concern in existing techniques. CAA is then defined, and instances of its introduction in various educational spheres are identified, with the main focus of the paper concerning the implementation of CAA. Through referenced articles, evidence is offered to inform practitioners, and direct further research into CAA from a technological and pedagogical perspective. This includes issues relating to interoperability of questions, security, test construction and testing higher cognitive skills. The paper concludes by suggesting that an institutional strategy for CAA coupled with staff development in test construction for a CAA environment can increase the chances of successful implementation

    Strategic Research Agenda for organic food and farming

    Get PDF
    The TP Organics Strategic Research Agenda (SRA) was finalised in December 2009. The purpose of the Strategic Research Agenda (SRA) is to enable research, development and knowledge transfer that will deliver relevant outcomes – results that will contribute to the improvement of the organic sector and other low external input systems. The document has been developed through a dynamic consultative process that ran from 2008 to 2009. It involved a wide range of stakeholders who enthusiastically joined the effort to define organic research priorities. From December 2008 to February; the expert groups elaborated the first draft. The consultative process involved the active participation of many different countries. Consultation involved researchers, advisors, members of inspection/certification bodies, as well as different users/beneficiaries of the research such as farmers, processors, market actors and members of civil society organisations throughout Europe and further afield in order to gather the research needs of the whole organic sector
    corecore