%0 Conference Proceedings %T A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model %+ University of Bristol [Bristol] %+ University of the Aegean %A Spyridopoulos, Theodoros %A Topa, Ioanna-Aikaterini %A Tryfonas, Theo %A Karyda, Maria %Z Part 10: Organizational Security %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 29th IFIP International Information Security Conference (SEC) %C Marrakech, Morocco %Y Nora Cuppens-Boulahia %Y Frédéric Cuppens %Y Sushil Jajodia %Y Anas Abou El Kalam %Y Thierry Sans %I Springer %3 ICT Systems Security and Privacy Protection %V AICT-428 %P 438-445 %8 2014-06-02 %D 2014 %R 10.1007/978-3-642-55415-5_37 %Z Computer Science [cs]Conference papers %X Industrial Control Systems (ICSs) are of the most important components of National Critical Infrastructure. They can provide control capabilities in complex systems of critical importance such as energy production and distribution, transportation, telecoms etc. Protection of such systems is the cornerstone of essential service provision with resilience and in timely manner. Effective risk management methods form the basis for the protection of an Industrial Control System. However, the nature of ICSs render traditional risk management methods insufficient. The proprietary character and the complex interrelationships of the various systems that form an ICS, the potential impacts outside its boundaries, along with emerging trends such as the exposure to the Internet, necessitate revisiting traditional risk management methods, in a way that treat an ICS as a system-of-systems rather than a single, one-off entity. Towards this direction, in this paper we present enhancements to the traditional risk management methods at the phase of risk assessment, by utilising the cybernetic construct of the Viable System Model (VSM) as a means towards a holistic view of the risks against Critical Infrastructure. For the purposes of our research, utilising VSM’s recursive nature, we model the Supervisory Control and Data Acquisition (SCADA) system, a most commonly used ICS, as a VSM and identify the various assets, interactions with the internal and external environment, threats and vulnerabilities. %G English %Z TC 11 %2 https://inria.hal.science/hal-01370393/document %2 https://inria.hal.science/hal-01370393/file/978-3-642-55415-5_37_Chapter.pdf %L hal-01370393 %U https://inria.hal.science/hal-01370393 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-AICT-428 %~ IFIP-TC11 %~ IFIP-SEC