Cybersecurity Vulnerability Mitigation Framework through Empirical Paradigm: Enhanced Prioritized Gap Analysis
Journal Article
·
· Future Generation Computer Systems
- BATTELLE (PACIFIC NW LAB)
- University of Arkansas at Little Rock
Existing cybersecurity vulnerability assessment tools were designed based on the policies and standards defined by organizations such as the U.S. Department of Energy and the National Institute of Standards and Technology (NIST). Frameworks such as the cybersecurity capability maturity model (C2M2) and the NIST Cybersecurity Framework (CSF) are often used by the critical infrastructure owners and operators to determine the cybersecurity maturity of their facility. Although these frameworks are exceptional at performing qualitative cybersecurity analysis and identifying vulnerabilities, they do not provide a means to perform prioritized mitigation of those vulnerabilities in order to achieve a desired cybersecurity maturity. To address that challenge, we developed a framework and software application called the cybersecurity vulnerability mitigation framework through empirical paradigm (CyFEr). This paper presents the detailed architecture of CyFEr’s enhanced prioritized gap analysis (EPGA) methodology and its application to CSF. The efficacy of the presented framework is demonstrated by comparing against existing similar models and testing against the cyber injects from a real-world cyber-attack that targeted industrial control systems (ICS) in critical infrastructures.
- Research Organization:
- Pacific Northwest National Laboratory (PNNL), Richland, WA (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- AC05-76RL01830
- OSTI ID:
- 1580581
- Report Number(s):
- PNNL-SA-143834
- Journal Information:
- Future Generation Computer Systems, Journal Name: Future Generation Computer Systems Vol. 105
- Country of Publication:
- United States
- Language:
- English
Similar Records
Cybersecurity Vulnerability Mitigation Framework through Empirical Paradigm (CyFEr): Prioritized Gap Analysis
Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework
DER Cybersecurity R&D
Journal Article
·
Mon Jun 03 00:00:00 EDT 2019
· IEEE Systems Journal
·
OSTI ID:1717874
Application of Rank-Weight Methods to Blockchain Cybersecurity Vulnerability Assessment Framework
Conference
·
Wed Jan 09 23:00:00 EST 2019
·
OSTI ID:1525865
DER Cybersecurity R&D
Conference
·
Tue Jan 10 19:00:00 EST 2023
·
OSTI ID:1909583