DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Cyber Hygiene for Control System Security

Abstract

There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.

Authors:
 [1]
  1. Idaho National Lab. (INL), Idaho Falls, ID (United States)
Publication Date:
Research Org.:
Idaho National Lab. (INL), Idaho Falls, ID (United States)
Sponsoring Org.:
USDOE Office of Nuclear Energy (NE)
OSTI Identifier:
1357478
Report Number(s):
INL/JOU-15-36770
Journal ID: ISSN 9999-0006
Grant/Contract Number:  
AC07-05ID14517
Resource Type:
Accepted Manuscript
Journal Name:
The CIP Report
Additional Journal Information:
Journal Volume: 10; Journal Issue: 08; Journal ID: ISSN 9999-0006
Publisher:
Center for Infrastructure Protection & Homeland Security
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; Business Case; Control Systems; Critical Infrastructure; Cybersecurity

Citation Formats

Oliver, David. Cyber Hygiene for Control System Security. United States: N. p., 2015. Web.
Oliver, David. Cyber Hygiene for Control System Security. United States.
Oliver, David. Thu . "Cyber Hygiene for Control System Security". United States. https://www.osti.gov/servlets/purl/1357478.
@article{osti_1357478,
title = {Cyber Hygiene for Control System Security},
author = {Oliver, David},
abstractNote = {There are many resources from government and private industry available to assist organizations in reducing their attack surface and enhancing their security posture. Furthermore, standards are being written and improved upon to make the practice of securing a network more manageable. And while the specifics of network security are complex, most system vulnerabilities can be mitigated using fairly simple cyber hygiene techniques like those offered above.},
doi = {},
journal = {The CIP Report},
number = 08,
volume = 10,
place = {United States},
year = {Thu Oct 08 00:00:00 EDT 2015},
month = {Thu Oct 08 00:00:00 EDT 2015}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record
The DOI is not currently available

Save / Share: