Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Development and analysis of system a...
~
Huff, Johnathon D.
Linked to FindBook
Google Book
Amazon
博客來
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment./
Author:
Huff, Johnathon D.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
Description:
192 p.
Notes:
Source: Dissertation Abstracts International, Volume: 78-09(E), Section: B.
Contained By:
Dissertation Abstracts International78-09B(E).
Subject:
Operations research. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10265311
ISBN:
9781369705751
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment.
Huff, Johnathon D.
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 192 p.
Source: Dissertation Abstracts International, Volume: 78-09(E), Section: B.
Thesis (Ph.D.)--Mississippi State University, 2017.
The need to secure critical infrastructure (CI) systems against attacks is a topic that has been discussed recently in literature. Many examples of attacks against CI exist, such as the physical attack on the Pacific Gas and Electric Metcalf substation in 2013 that caused millions of dollars in damage or the Stuxnet cyber-attack which was identified in 2010 that caused damage to Iran's nuclear program and alerted the world to the existence of cyber weapons. As a result of these types of events in which vulnerabilities in CI are exploited, it is important to have a comprehensive systems approach for assessing the vulnerabilities in CI systems. This dissertation seeks to provide a method for engineers to use system and human architectures to perform vulnerability assessment (VA) and decision analysis to enable decision makers to make tradeoffs on how to use their resources to protect CI against attacks. There are several gaps in literature in how to use system and human architectures to perform VA to protect CI from damage. First, no method exists that uses a model based approach and human and system architectures to perform a comprehensive analysis of CI to develop decision analysis models to aid decision makers in determining the most effective use of security resources to secure their CI systems. It is important that such models be comprehensive by including industry standards, system and human architectures, attack scenarios, subject matter expert opinion and models for analysis to help decision makers determine the best security investments. Second, there is not an established method to develop detailed mathematical models from an operational activity diagram that represents an attack scenario. This is important because the translation from architecture to high fidelity models will enable CI asset owners to make tradeoffs on security resource use. Finally, there is no method to evaluate the role of humans in a CI VA based on human views of the system. This dissertation provides an approach to use human and system architectures to perform VA and decision analysis to fill these gaps.
ISBN: 9781369705751Subjects--Topical Terms:
547123
Operations research.
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment.
LDR
:03144nmm a2200313 4500
001
2203324
005
20190531104654.5
008
201008s2017 ||||||||||||||||| ||eng d
020
$a
9781369705751
035
$a
(MiAaPQ)AAI10265311
035
$a
(MiAaPQ)msstate:12898
035
$a
AAI10265311
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Huff, Johnathon D.
$3
3430115
245
1 0
$a
Development and analysis of system and human architectures for critical infrastructure vulnerability assessment.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
192 p.
500
$a
Source: Dissertation Abstracts International, Volume: 78-09(E), Section: B.
500
$a
Advisers: Hugh R. Medal; Brian Smith.
502
$a
Thesis (Ph.D.)--Mississippi State University, 2017.
520
$a
The need to secure critical infrastructure (CI) systems against attacks is a topic that has been discussed recently in literature. Many examples of attacks against CI exist, such as the physical attack on the Pacific Gas and Electric Metcalf substation in 2013 that caused millions of dollars in damage or the Stuxnet cyber-attack which was identified in 2010 that caused damage to Iran's nuclear program and alerted the world to the existence of cyber weapons. As a result of these types of events in which vulnerabilities in CI are exploited, it is important to have a comprehensive systems approach for assessing the vulnerabilities in CI systems. This dissertation seeks to provide a method for engineers to use system and human architectures to perform vulnerability assessment (VA) and decision analysis to enable decision makers to make tradeoffs on how to use their resources to protect CI against attacks. There are several gaps in literature in how to use system and human architectures to perform VA to protect CI from damage. First, no method exists that uses a model based approach and human and system architectures to perform a comprehensive analysis of CI to develop decision analysis models to aid decision makers in determining the most effective use of security resources to secure their CI systems. It is important that such models be comprehensive by including industry standards, system and human architectures, attack scenarios, subject matter expert opinion and models for analysis to help decision makers determine the best security investments. Second, there is not an established method to develop detailed mathematical models from an operational activity diagram that represents an attack scenario. This is important because the translation from architecture to high fidelity models will enable CI asset owners to make tradeoffs on security resource use. Finally, there is no method to evaluate the role of humans in a CI VA based on human views of the system. This dissertation provides an approach to use human and system architectures to perform VA and decision analysis to fill these gaps.
590
$a
School code: 0132.
650
4
$a
Operations research.
$3
547123
650
4
$a
Industrial engineering.
$3
526216
650
4
$a
Systems science.
$3
3168411
690
$a
0796
690
$a
0546
690
$a
0790
710
2
$a
Mississippi State University.
$b
Industrial and Systems Engineering.
$3
1023487
773
0
$t
Dissertation Abstracts International
$g
78-09B(E).
790
$a
0132
791
$a
Ph.D.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10265311
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9379873
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login