Cyber Hygiene for Control System Security
Abstract
There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.
- Authors:
-
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
- Publication Date:
- Research Org.:
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
- Sponsoring Org.:
- USDOE Office of Nuclear Energy (NE)
- OSTI Identifier:
- 1357478
- Report Number(s):
- INL/JOU-15-36770
Journal ID: ISSN 9999-0006
- Grant/Contract Number:
- AC07-05ID14517
- Resource Type:
- Accepted Manuscript
- Journal Name:
- The CIP Report
- Additional Journal Information:
- Journal Volume: 10; Journal Issue: 08; Journal ID: ISSN 9999-0006
- Publisher:
- Center for Infrastructure Protection & Homeland Security
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; Business Case; Control Systems; Critical Infrastructure; Cybersecurity
Citation Formats
Oliver, David. Cyber Hygiene for Control System Security. United States: N. p., 2015.
Web.
Oliver, David. Cyber Hygiene for Control System Security. United States.
Oliver, David. Thu .
"Cyber Hygiene for Control System Security". United States. https://www.osti.gov/servlets/purl/1357478.
@article{osti_1357478,
title = {Cyber Hygiene for Control System Security},
author = {Oliver, David},
abstractNote = {There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.},
doi = {},
journal = {The CIP Report},
number = 08,
volume = 10,
place = {United States},
year = {Thu Oct 08 00:00:00 EDT 2015},
month = {Thu Oct 08 00:00:00 EDT 2015}
}
Free Publicly Available Full Text
Publisher's Version of Record
The DOI is not currently available
Other availability
Save to My Library
You must Sign In or Create an Account in order to save documents to your library.