Unlock instant, AI-driven research and patent intelligence for your innovation.

Dynamic Quantification of Cybersecurity Risks in Control Systems

A network security and control system technology, applied in the field of dynamic quantification, can solve problems such as equipment/equipment being vulnerable to attacks

Active Publication Date: 2020-06-12
HONEYWELL INT INC
View PDF18 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Even standalone devices / equipment may be vulnerable, such as through viruses introduced via a Universal Serial Bus (USB) memory "stick"

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic Quantification of Cybersecurity Risks in Control Systems
  • Dynamic Quantification of Cybersecurity Risks in Control Systems
  • Dynamic Quantification of Cybersecurity Risks in Control Systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The disclosed embodiments are described with reference to the drawings, wherein like reference numerals are used throughout to designate similar or equivalent elements. The figures are not drawn to scale, and they are provided merely to illustrate aspects disclosed herein. Several disclosed aspects are described below with reference to example applications for illustration. It should be understood that numerous specific details, relationships, and methods are set forth in order to provide a thorough understanding of the embodiments disclosed herein.

[0023] However, one of ordinary skill in the relevant art will readily recognize that the disclosed embodiments may be practiced without one or more of the specific details or with other methods. In other instances, well-known structures or operations have not been shown in detail to avoid obscuring aspects disclosed herein. The disclosed embodiments are not limited by the illustrated order of acts or events, as some act...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system (100) and method (600) for analyzing cybersecurity risk interdependencies in a control system (150) having networked devices (160). The system includes a central server (105) having a processor (110) and a memory device (116) in communication with the processor. The memory device stores inter-device dependencies ( 362 ) and quantifies individual risks ( 312 ) for each networked device. The memory device also stores a dynamic quantification of risk (DQR) program (128). The central server is programmed to implement the DQR program. In response to the observed network behavior, the central server alters the one or more quantified individual risks to generate (616) at least one modified quantified individual risk (326). The quantified individual risk for at least one other of the networked devices is used to dynamically modify the quantified individual risk for the first device to generate (618) Inter-device modifications quantify individual risks (328).

Description

technical field [0001] The disclosed embodiments relate generally to cybersecurity for networks associated with control systems, and more specifically to dynamic quantification of cybersecurity risks in control systems. Background technique [0002] Computer systems are used to perform a variety of different tasks. For example, industrial networks of computer systems and equipment are used to control and / or monitor industrial systems known as industrial control systems (ICS). Such ICS could be used in connection with manufacturing, power generation, energy distribution, waste treatment, transportation, telecommunications and water treatment. The ICS may be connected and accessible via other networks (both directly and indirectly), including corporate networks and the Internet. [0003] Accordingly, industrial networks may be vulnerable to both internal and external cyber attacks. As a precaution against attacks from external networks, firewalls or other security measures ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F21/57
CPCG06F21/552G06F21/577G06F2221/034G06F2221/2115G06F2221/2145H04L63/1433
Inventor E.D.克纳普
Owner HONEYWELL INT INC