Where does ICS Cyber Security Fit?

April 21, 2010

At the request of the Office of the Director of National Intelligence, the National Research Council (NRC) is undertaking a project entitled “Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.”  In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation’s important computer and communications systems and networks is a problem that looms large.

At the request of the Office of the Director of National Intelligence, the National Research Council (NRC) is undertaking a project entitled “Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy.”  In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation’s important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures (that is, measures taken unilaterally by an organization to increase the resistance of an information technology system or network to attack), it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. There were 51 questions of interest from the following categories:
- Theoretical Models for Cyberdeterrence
- Cyberdeterrence and Declaratory Policy
- Operational Considerations in Cyberdeterrence
- Regimes of Reciprocal/Consensual Limitations
- Cyberdeterrence in a Larger Context
- The Dynamics of Action/Reaction
- Escalation Dynamics
- Collateral Issues

Of the 51 questions, only 6 even tangentially addressed critical infrastructure ICSs.  Reminiscent of the RSA Conference, an abstract to respond to the solicitation was not accepted because ICSs didn’t fit. In fact, the chief scientist told me “The Computer Science and Telecommunications Board (CSTB) has been trying to prompt attention to ICS issues for a while, but this project isn't an appropriate venue.”  What is the appropriate venue?

Joe Weiss

Sponsored Recommendations

Make Effortless HMI and PLC Modifications from Anywhere

The tiny EZminiWiFi is a godsend for the plant maintenance engineers who need to make a minor modification to the HMI program or, for that matter, the PLC program. It's very easy...

The Benefits of Using American-Made Automation Products

Discover the benefits of American-made automation products, including stable pricing, faster delivery, and innovative features tailored to real-world applications. With superior...

50 Years of Automation Innovation and What to Expect Next

Over the past 50 years, the automation technology landscape has changed dramatically, but many of the underlying industry needs remain unchanged. To learn more about what’s changed...

Manufacturing Marvels Highlights Why EZAutomation Is a Force to Be Reckoned With

Watch EZAutomation's recent feature on the popular FOX Network series "Manufacturing Marvels" and discover what makes them a force to be reckoned with in industrial automation...