TY - GEN
T1 - Optimizing investments in cyber-security for critical infrastructure
AU - Patterson, Ike
AU - Nutaro, James
AU - Allgood, Glenn
AU - Kuruganti, Teja
AU - Fugate, David
PY - 2013
Y1 - 2013
N2 - Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making optimal investment decisions that balance these three aspects of a cyber-defense. The proposed method accounts for the physical process that is being controlled and the relative cost and performance of technologies for prevention, detection, and mitigation. We illustrate the proposed method with a model of a chiller that is based on the supercomputer chillers at Oak Ridge National Laboratory. This model is used to select security capabilities that yields the greatest protection for a fixed budget.
AB - Investments in the cyber-security of critical infrastructure must balance preventing intrusion, detecting a cyber-attack, and mitigating the attacker's physical effects on computer controlled equipment. For this purpose, we outline a method for making optimal investment decisions that balance these three aspects of a cyber-defense. The proposed method accounts for the physical process that is being controlled and the relative cost and performance of technologies for prevention, detection, and mitigation. We illustrate the proposed method with a model of a chiller that is based on the supercomputer chillers at Oak Ridge National Laboratory. This model is used to select security capabilities that yields the greatest protection for a fixed budget.
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=84875975156&partnerID=8YFLogxK
U2 - 10.1145/2459976.2459999
DO - 10.1145/2459976.2459999
M3 - Conference contribution
AN - SCOPUS:84875975156
SN - 9781450316873
T3 - ACM International Conference Proceeding Series
BT - 8th Annual Cyber Security and Information Intelligence Research Workshop
T2 - 8th Annual Cyber Security and Information Intelligence Research Workshop: Federal Cyber Security R and D Program Thrusts, CSIIRW 2013
Y2 - 8 January 2013 through 10 January 2013
ER -