Visible to the public Determining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator

TitleDetermining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator
Publication TypeConference Paper
Year of Publication2020
AuthorsChernov, D., Sychugov, A.
Conference Name2020 International Russian Automation Conference (RusAutoCon)
Keywordsautomated process control systems, Automation, control engineering computing, control system security, destructive action, destructive actions, hazard quotient, Hazards, industrial control systems, industrial facilities, Information security, information security system, information security violator, MATLAB, multilevel distributed automated process control systems, open sources, process control, process criticality category, production engineering computing, pubcrawl, public domain software, resilience, Resiliency, Scalability, security of data, Software
AbstractThe purpose of the work is a formalized description of the method determining numerical expression of the danger from actions potentially implemented by an information security violator. The implementation of such actions may lead to a disruption of the ordered functioning of multilevel distributed automated process control systems, which indicates the importance of developing new adequate solutions for predicting attacks consequences. The analysis of the largest destructive effects on information security systems of critical objects is carried out. The most common methods of obtaining the value of the hazard quotient of information security violators' destructive actions are considered. Based on the known methods for determining the possible damage from attacks implemented by a potential information security violator, a new, previously undetected in open sources method for determining the hazard quotient of destructive actions of an information security violator has been proposed. In order to carry out experimental calculations by the proposed method, the authors developed the required software. The calculations results are presented and indicate the possibility of using the proposed method for modeling threats and information security violators when designing an information security system for automated process control systems.
Citation Keychernov_determining_2020