Methodology for Prioritizing Cyber-Vulnerable Assets in Nuclear Power Representative System Architecture
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
International Conference on Intelligent User Interfaces, Proceedings IUI
A hypothetical scenario is utilized to explore privacy and security considerations for intelligent systems, such as a Personal Assistant for Learning (PAL). Two categories of potential concerns are addressed: factors facilitated by user models, and factors facilitated by systems. Among the strategies presented for risk mitigation is a call for ongoing, iterative dialog among privacy, security, and personalization researchers during all stages of development, testing, and deployment.
Abstract not provided.
Abstract not provided.
The outline for the presentation is: (1) Advance preparation - (a) Think about attacks before they happen, (b) Configuration Management, (c) Backups, (d) Off-site storage, (e) Design and build for resiliency, (f) Training operators to detect attack; (2) Detection - (a) How do I know I've been attacked, (b) The front-line detection system - operators; (3) Triage - (a) Working through the attack, (b) Law enforcement or business continuity, (c) Deciding what to fix first; (4) Field Equipment Forensics - (a) Engineering Workstation, (b) Projects/Configurations/Programs; and (5) Conclusion and Discussion. Red teaming works for supply chain - Finds the worst attacks across multiple dimensions, Shows where to best expend resources to reduce risk, and Provides positive control of potentially negative activities.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.
Abstract not provided.