A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva, Pete Burnap, Andre Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kris Stoddart

Research output: Contribution to journalArticlepeer-review

468 Citations (Scopus)
316 Downloads (Pure)

Abstract

This paper reviews the state of the art in cyber security risk assessment of Supervisory Control and Data Acquisition (SCADA) systems. We select and in-detail examine twenty-four risk assessment methods developed for or applied in the context of a SCADA system. We describe the essence of the methods and then analyse them in terms of aim; application domain; the stages of risk management addressed; key risk management concepts covered; impact measurement; sources of probabilistic data; evaluation and tool support. Based on the analysis, we suggest an intuitive scheme for the categorisation of cyber security risk assessment methods for SCADA systems. We also outline five research challenges facing the domain and point out the approaches that might be taken.
Original languageEnglish
Pages (from-to)1-27
Number of pages27
JournalComputers & Security
Volume56
Early online date13 Oct 2015
DOIs
Publication statusPublished - 01 Feb 2016

Keywords

  • SCADA
  • cyber security
  • risk assessment
  • risk analysis

Fingerprint

Dive into the research topics of 'A review of cyber security risk assessment methods for SCADA systems'. Together they form a unique fingerprint.

Cite this