The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security assessment of the ICT components of critical infrastructures is nowadays a prominent problem. Risk assessment methodologies require, in order to be effective, to be fed with data regarding the functioning and the behavior of the system under analysis, the potential vulnerabilities, the results and the effects of the possible cyber-attacks etc. Unfortunately the availability of security...
The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic...
Industry, in parallel with a pervasive use of information and communication technologies, has begun in the last years to take into consideration the use of public information infrastructures (including the Internet) for remotely monitoring, managing and maintaining their technical systems. Concurrently, private and public networks are used for interconnecting technical and business information systems...
The assessment and the evaluation of the risk exposure to failures and cyber attacks, is nowadays - in times of pervasive ICT applications - a much required task. However, in some cases, and especially when evaluating an ICT infrastructure (which can be logically and geographically sparse and which can provide services to other systems), the evaluation of system risk is not sufficient. In fact in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.