Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.1.347

A Study and Analysis on Case Study of Security Evaluation Tool  

Kim, Hyun-il (Department of Convergence Science, Kongju National University)
Park, Kyungyun (Department of Convergence Science, Kongju National University)
Seo, Changho (Department of Convergence Science, Kongju National University)
Moon, Daesung (Electronics and Telecommunications Research Institute(ETRI))
Publication Information
Journal of Digital Convergence / v.17, no.1, 2019 , pp. 347-356 More about this Journal
Abstract
Recently, the liberalization of industrial control systems has been accompanied by a major change in the structural paradigm of information systems in the public and public sectors, and potential cyber security problems in the future major infrastructure control systems that cannot respond to the level of security of existing information systems. To cope with this, a cyber security evaluation tool that can evaluate security vulnerability in three dimensions against various infrastructure control system environment is needed. However, a cyber security evaluation in the domestic environments does not have the concept of the current security status and satisfy settings of the infrastructure. Also, the most of items in that environments have had short-term inspection themselves which makes a limitation by a technical area. In order to overcome this problems, many researches are needed to apply CSET (Cyber Security Evaluation Tool) which is the US cyber security evaluation tool to the control environment of various domestic infrastructure. In this paper, first, we analyze methods to apply to the major domain through the analysis of various case studies on existing security assessement tools. Finally, we discuss future directions.
Keywords
CSET; DCS; SCADA; Open systems; Security evaluation;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 ICS-CERT. Assessments. CEST Cyber Security Evalutaion Tool. https://ics-certus-cert.gov/Assessments
2 ICS-CERT. Downloading and Installing CSET. CEST Cyber Security Evalutaion Tool. https://ics-cert.us-cert.gov/Downloading-and-Installing-CSET.
3 WIKIPEDIA. SCADA. https://en.wikipedia.org/wiki/SCADA
4 NCS. (2004). Supervisory Control and Data Acquisition (SCADA) Systems.
5 C. K. Lee. (2004). Design of an Integrated I&C System Daejeon : KAERI.
6 Y. R. Choi. (2009). Development of IT-based Cyber Security Technology for Nuclear Power Plant. Daejeon: KAERI.
7 Y. J. Kim, J. H. Lee & J. I. Lim. (2009). A Study on the Secure Plan of Security in SCADA Systems. Journal of the Korea Institute of Information Security & Cryptology, 19(6), 145-152.
8 D. J. Kang, J. J. Lee, Y. Lee, I. S. Lee & H. K. Kim. (2013). Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry. Journal of the Korea Institute of Information Security & Cryptology, 23(3), 445-457.   DOI
9 H. Kim. (2009). Analysis of Overseas System based Evaluation Cases and Technology. Naju: KISA.
10 T. H. Woo. (2013). Systems thinking safety analysis: nuclear security assessment of physical protection system in nuclear power plants. Science and Technology of Nuclear Installations, 2013.
11 Y. Zhang, L. Wang, Y. Xiang & C. W. Ten. (2015). Power system reliability evaluation with SCADA cybersecurity considerations. IEEE Transactions on Smart Grid, 6(4), 1707-1721.   DOI
12 G. N. Ericsson. (2010). Cyber security and power system communication-essential parts of a smart grid infrastructure. IEEE Transactions on Power Delivery, 25(3), 1501-1507.   DOI
13 M. Negrete-Pincetic, F. Yoshida & G. Gross. (2009, July). Towards quantifying the impacts of cyber attacks in the competitive electricity market environment. In IEEE Power Tech Conference (pp. 1332-1336).
14 Korea Electrotechnology Research Institute. (2008). A Study to investigate Industrial Customer Interruption Cost for Power System Planning. Seoul : Korea Electrotechnology Research Institute.
15 HelloT. (2010). Control system publication and security issues. HelloT(Online). http://magazine.hellot.net/magz/article/articleDetail.do?flag=all&showType=showType1&articleId=ARTI_000000000035281&articleAllListSortType=sort_1&page=1&selectYearMonth=201009&subCtgId