Saudi Cultural Missions Theses & Dissertations
Permanent URI for this communityhttps://drepo.sdl.edu.sa/handle/20.500.14154/10
Browse
2 results
Search Results
Item Restricted Risk Assessment and Advance Alert Notification for Smart Grid(Cardiff University, 2023-09-07) Khawaji, Moath Majdi; Saxena, NeeteshAs the global commercial and industrial sectors prosper, the demand for energy has prompted a pivotal shift from traditional electrical grids to smart grids (SG). Leveraging digital technology, SGs enhance efficiency and provide a more sustainable solution (Rawat and Bajracharya 2015). However, this evolution also magnifies the sector's vulnerability to cyber threats, as underscored by prominent cyber-attacks in recent history. This research project aims to delve into the intricacies of SG cybersecurity, leveraging the attack graph approach to identify critical assets within the proposed SG system model and assess associated risks. By focusing on critical assets and understanding system interconnectivity, a dynamic risk assessment model coupled with a state-of-the-art alert notification tool is proposed here to proactively counter threats and fortify SG system resilience. Ultimately, our objective is to strengthen the security of SGs, safeguarding them against looming cyber threats.13 0Item Restricted Security Risk Analysis for Industrial Control Systems Malwares(Saudi Digital Library, 2023-12-06) Alrihali, Muhannad; Raza, HassanIndustrial Control Systems (ICS) play a vital role in the operation and administration of critical infrastructures, such as power plants, industrial facilities, water treatment plants, and transportation networks. However, the growing number of targeted attacks with malware focused on these systems has generated significant concern over their security. This dissertation thoroughly investigates comprehensive risk analysis on ICS malware, addressing the gap between the technical details of these attacks and their broader implications for the reliability and security of critical infrastructures. This study comprehensively analyses notable examples of ICS malware, such as HermeticWiper, BlackEnergy, and Industroyer 2, by utilising a strategic combination of the MITRE ATT&CK, NIST SP 800-82, and CIS frameworks. The implementation of an integrated approach provides a proactive method for the recognition and reduction of security issues. This dissertation offers valuable insights into the strategies and techniques employed by cyber adversaries through an analysis of the behaviour and technical aspects of the attacks and security risk analysis. This dissertation highlights the need to thoroughly understand the risks associated with ICS malware through combined technical research and strategic risk assessment.39 0