{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:37:48Z","timestamp":1725557868368},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387885223"},{"type":"electronic","value":"9780387885230"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-88523-0_13","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T17:03:08Z","timestamp":1276621388000},"page":"173-187","source":"Crossref","is-referenced-by-count":5,"title":["Automated Assessment Of Compliance With Security Best Practices"],"prefix":"10.1007","author":[{"given":"Zahid","family":"Anwar","sequence":"first","affiliation":[]},{"given":"Roy","family":"Campbell","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1_13","unstructured":"American Gas Association, Cryptographic Protection of SCADA Communications; Part 1: Background, Policies and Test Plan, AGA Report No. 12 (Part 1), Draft 5, Washington, DC (\n                    www.gtiservices.org\/security \/AGA12Draft5r3.pdf\n                    \n                  ), 2005."},{"key":"13_CR2_13","unstructured":"AT'T Research, Graphviz \u2014 Graph Visualization Software, Florham Park, New Jersey (\n                    www.graphviz.org\n                    \n                  )."},{"key":"13_CR3_13","volume-title":"Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks","author":"British Columbia Institute of Technology","year":"2005","unstructured":"British Columbia Institute of Technology, Good Practice Guide on Firewall Deployment for SCADA and Process Control Networks, National Infrastructure Security Co-ordination Centre, London, United Kingdom, 2005."},{"key":"13_CR4_13","unstructured":"British Columbia Institute of Technology, Industrial Security Incident Database, Burnaby, Canada."},{"key":"13_CR5_13","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-0-387-75462-8_9","volume-title":"Critical Infrastructure Protection","author":"R. Chandia","year":"2007","unstructured":"R. Chandia, J. Gonzalez, T. Kilpatrick, M. Papa and S. Shenoi, Security strategies for SCADA networks, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 117\u2013131, 2007."},{"key":"13_CR6_13","unstructured":"Cooperative Association for Internet Data Analysis, The CAIDA web site, La Jolla, California (\n                    www.caida.org\n                    \n                  )."},{"key":"13_CR7_13","volume-title":"Critical Infrastructure Protection: Challenges in Securing Control Systems, Report GAO-04-140T","author":"R. Dacey","year":"2004","unstructured":"R. Dacey, Critical Infrastructure Protection: Challenges in Securing Control Systems, Report GAO-04-140T, United States General Accounting Office, Washington, DC (www.gao.gov\/new.items\/d04140t.pdf), 2004."},{"key":"13_CR8_13","volume-title":"Common Information Model (CIM) Infrastructure Specification, Document DSP0004 Version 2.3 Final","author":"Distributed Management Task Force","year":"2005","unstructured":"Distributed Management Task Force, Common Information Model (CIM) Infrastructure Specification, Document DSP0004 Version 2.3 Final, Portland, Oregon (www.dmtf.org\/standards\/published_documents \/DSP0004V2.3_final.pdf), 2005."},{"key":"13_CR9_13","unstructured":"Federal Energy Regulatory Commission, Mandatory Reliability Standards for Critical Infrastructure Protection, Docket No. RM06-22-000; Order No. 706, Washington, DC (ferc.gov\/whats-new\/comm-meet\/2008\/011708\/E-2.pdf), 2008."},{"key":"13_CR10_13","unstructured":"Industrial Automation Open Networking Association, The IAONA Handbook for Network Security, Version 1.3, Magdeburg, Germany (\n                    www.iaona.org\/pictures\/files\/1122888138-IAONA_HNS1_3-reduced_050 725.pdf\n                    \n                  ), 2005."},{"key":"13_CR11_13","volume-title":"Security Technologies for Manufacturing and Control Systems (ANSI\/ISA-TR99.00.01-2004)","author":"Instrumentation Systems and Automation Society","year":"2004","unstructured":"Instrumentation Systems and Automation Society, Security Technologies for Manufacturing and Control Systems (ANSI\/ISA-TR99.00.01-2004), Research Triangle Park, North Carolina, 2004."},{"key":"13_CR12_13","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-0-387-75462-8_26","volume-title":"Critical Infrastructure Protection","author":"M. Masera","year":"2007","unstructured":"M. Masera and I. Nai Fovino, A service-oriented approach for assessing infrastructure security, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 367\u2013379, 2007."},{"key":"13_CR13_13","unstructured":"D. Maynor and R. Graham, SCADA security and terrorism: We're not crying wolf! presented at the Black Hat Federal Conference, 2006."},{"key":"13_CR14_13","volume-title":"Sources: Staged cyber attack reveals vulnerability in power grid","author":"J. Meserve","year":"2007","unstructured":"J. Meserve, Sources: Staged cyber attack reveals vulnerability in power grid, Cable News Network, Atlanta, Georgia (www.cnn.com\/2007\/US \/09 \/26\/power.at.risk), September 26, 2007."},{"key":"13_CR15_13","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.FIPS.199","volume-title":"Standards for Security Categorization of Federal Information and Information Systems, FIPS Publication 199","author":"National Institute of Standards and Technology","year":"2004","unstructured":"National Institute of Standards and Technology, Standards for Security Categorization of Federal Information and Information Systems, FIPS Publication 199, Gaithersburg, Maryland, 2004."},{"key":"13_CR16_13","unstructured":"M. Rash, psad: Intrusion detection for iptables (\n                    www.cipherdyne.com \/psad\n                    \n                  )."},{"key":"13_CR17_13","volume-title":"Guide for Assessing the Security Controls in Federal Information Systems, NIST Special Publication 800-53A, National Institute of Standards and Technology","author":"R. Ross","year":"2008","unstructured":"R. Ross, A. Johnson, S. Katzke, P. Toth, G. Stoneburner and G. Rogers, Guide for Assessing the Security Controls in Federal Information Systems, NIST Special Publication 800-53A, National Institute of Standards and Technology, Gaithersburg, Maryland, 2008."},{"key":"13_CR18_13","unstructured":"SourceForge.net, AfterGlow (afterglow.sourceforge.net)."},{"key":"13_CR19_13","unstructured":"Y. Stamatiou, E. Skipenes, E. Henriksen, N. Stathiakis, A. Sikianakis, E. Charalambous, N. Antonakis, K. Stolen, F. den Braber, M. Sodal Lund, K. Papadaki and G. Valvis, The CORAS approach for model-based risk management applied to a telemedicine service Proceedings of the European Medical Informatics Conference, pp. 206\u2013211, 2003."},{"key":"13_CR20_13","unstructured":"K. Ziegler, NERC cyber security standards to become mandatory in United States Electric Energy Industry News, January 21, 2008."}],"container-title":["IFIP \u2013 The International Federation for Information Processing","Critical Infrastructure Protection II"],"original-title":[],"language":"en","deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T19:55:28Z","timestamp":1551642928000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-88523-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387885223","9780387885230"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-88523-0_13","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[]}}