Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Mapping out dependencies in network components in critical infrastructure
Linköping University, Department of Computer and Information Science, Software and Systems.
2018 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Companies that operate with critical infrastructure face a growing threat from cyber-attacks while at the same time the development in the business is rapidly moving towards a higher level of digitalization. A common type of system in critical infrastructure is supervisory control and data acquisition systems, these systems have properties that can affect their security and will therefore serve as the basis for this thesis work. To stay protected despite systems changes, companies need to make risk assessments in order to analyze how changes will affect the overall system. One thing that is important to focus on is dependencies within the system, this means that not only interaction among computers and networks are concerned but instead a more holistic view of the system need to be considered. This thesis aims to aid the process of a future risk assessment by providing a methodology to be used as a preparatory step before a risk assessment by describing the current situation of the system. This is done by evaluating two system modeling approaches, and also by proposing a number of perspectives that each provides different kind of information about the system’s dependencies. These perspectives are then evaluated by creating system models and dependency graphs, and discussing the outcomes with experts in a utility company to find out their applicability. According to the experts, the proposed perspectives have promising properties that can be useful in future risk assessments as well as in other scenarios. Moreover, the evaluated modeling approaches got positive comments during evaluation and are considered to serve their purpose.

Place, publisher, year, edition, pages
2018. , p. 53
Keyword [en]
critical infrastructure, system dependencies, scada network, dependency analysis, mapping components, system modeling
National Category
Computer and Information Sciences
Identifiers
URN: urn:nbn:se:liu:diva-143981ISRN: LIU-IDA/LITH-EX-A--17/051—SEOAI: oai:DiVA.org:liu-143981DiVA, id: diva2:1170123
External cooperation
Tekniska verken AB
Subject / course
Information Technology
Presentation
2017-11-03, Alan Turing, Linköpings universitet, LInköping, 13:15 (Swedish)
Supervisors
Examiners
Available from: 2018-01-03 Created: 2018-01-02 Last updated: 2018-01-13Bibliographically approved

Open Access in DiVA

fulltext(2126 kB)91 downloads
File information
File name FULLTEXT01.pdfFile size 2126 kBChecksum SHA-512
14b0e665d8aea8a9e83a146ef6f7f6dd6684fc356354342dfb13c97188d0097a5acef995e20e1c5672d7baeca255c63c3f52d3487cc1e6d5289279976d6cb1f9
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Andersson, Karl
By organisation
Software and Systems
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 91 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 246 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf