Security Assessment Of A Turbo-Gas Power Plant

  • Marcelo Masera
  • Igor Nai Fovino
  • Rafal Leszczyna
Conference paper
Part of the The International Federation for Information Processing book series (IFIPAICT, volume 290)

Critical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.


Turbo-gas power plant security assessment 


  1. 1.
    C. Alberts and A. Dorofee, Managing Information Security Risks: TheOCTAVE (SM) Approach, Addison-Wesley, Boston, Massachusetts, 2002.Google Scholar
  2. 2.
    G. Dondossola, J. Szanto, M. Masera and I. Nai Fovino, Effects of inten tional threats to power substation control systems, International Journal of Critical Infrastructures, vol. 4(1/2), pp. 129–143, 2008.CrossRefGoogle Scholar
  3. 3.
    R. Leszczyna, I. Nai Fovino and M. Masera, MalSim — Mobile agent mal-ware simulator, Proceedings of the First International Conference on Simulation Tools and Techniques for Communications, Networks and Systems,2008.Google Scholar
  4. 4.
    M. Masera and I. Nai Fovino, A framework for the security assessment of remote control applications of critical infrastructures, Proceedings of the Twenty-Ninth ESReDA Seminar, 2005.Google Scholar
  5. 5.
    M. Masera and I. Nai Fovino, Emergent disservices in interdependent systems and systems-of-systems, Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, vol. 1, pp. 590–595, 2006.Google Scholar
  6. 6.
    M. Masera and I. Nai Fovino, Models for security assessment and management, Proceedings of the International Workshop on Complex Network and Infrastructure Protection, 2006.Google Scholar
  7. 7.
    M. Masera and I. Nai Fovino, Through the description of attacks: A multidimensional view, Proceedings of the Twenty-Fifth International Conference on Computer Safety, Reliability and Security, pp. 15–28, 2006.Google Scholar
  8. 8.
    I. Nai Fovino and M. Masera, A service-oriented approach for assessing infrastructure security, in Critical Infrastructure Protection, E. Goetz and S. Shenoi (Eds.), Springer, Boston, Massachusetts, pp. 367–379, 2007.Google Scholar
  9. 9.
    I. Nai Fovino, M. Masera and A. Decian, Integrating cyber attack within fault trees, Proceedings of the European Safety and Reliability Conference,2007.Google Scholar
  10. 10.
    United States General Accounting Office, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, Report GAO-04-354, Washington, DC (, 2004.

Copyright information

© IFIP International Federation for Information Processing 2008

Authors and Affiliations

  • Marcelo Masera
    • 1
  • Igor Nai Fovino
    • 1
  • Rafal Leszczyna
    • 1
  1. 1.Joint Research Center of the European CommissionInstitute for the Protection and Security of the CitizenIspraItaly

Personalised recommendations