Optimizing investments in cyber-security for critical infrastructure

Ike Patterson, James Nutaro, Glenn Allgood, Teja Kuruganti, David Fugate

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

8 Scopus citations

Abstract

Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making optimal investment decisions that balance these three aspects of a cyber-defense. The proposed method accounts for the physical process that is being controlled and the relative cost and performance of technologies for prevention, detection, and mitigation. We illustrate the proposed method with a model of a chiller that is based on the supercomputer chillers at Oak Ridge National Laboratory. This model is used to select security capabilities that yields the greatest protection for a fixed budget.

Original languageEnglish
Title of host publication8th Annual Cyber Security and Information Intelligence Research Workshop
Subtitle of host publicationFederal Cyber Security R and D Program Thrusts, CSIIRW 2013
DOIs
StatePublished - 2013
Event8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013 - Oak Ridge, TN, United States
Duration: Jan 8 2013Jan 10 2013

Publication series

NameACM International Conference Proceeding Series

Conference

Conference8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013
Country/TerritoryUnited States
CityOak Ridge, TN
Period01/8/1301/10/13

Keywords

  • Security

Fingerprint

Dive into the research topics of 'Optimizing investments in cyber-security for critical infrastructure'. Together they form a unique fingerprint.

Cite this