• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Guardians of the Grid : A Comparative Study of Best Practices and Experts' Current Approaches in Cybersecurity for Control Systems

Thyberg, Joel January 2024 (has links)
This thesis investigates which cybersecurity strategies should be implemented in control systems to enhance cybersecurity. The study addresses three central questions, carefully designed to guide the research through its various phases and fulfill its purpose. The first question examines which cybersecurity strategies should be implemented in control systems in accordance with current requirements and established best practices. To answer this, a literature review of previous research and new cybersecurity requirements was conducted, identifying best practices for cybersecurity in control systems. The second question explores which cybersecurity strategies are currently implemented by actors in their management of products within the control system architecture. This was investigated through semi-structured interviews with five experts who deliver products within this architecture. To address the third question, which focuses on how actors within the control system architecture can streamline cybersecurity measures in their products, an analysis and comparison between best practices and current practices were conducted. This discussion revealed that a risk assessment and network segmentation should be implemented to enhance cybersecurity. Additionally, increased cybersecurity competence and the introduction of logging and monitoring of systems and components can further improve security.

Page generated in 0.0853 seconds