Show simple item record

dc.contributor.advisorStuart Madnick and Keri Pearlson.
dc.contributor.authorSapienza, Michael Louis.en_US
dc.contributor.otherMassachusetts Institute of Technology. Engineering Systems Division.en_US
dc.contributor.otherSystem Design and Management Program.en_US
dc.date.accessioned2022-08-31T16:29:35Z
dc.date.available2022-08-31T16:29:35Z
dc.date.copyright2019en_US
dc.date.issued2019en_US
dc.identifier.urihttps://hdl.handle.net/1721.1/145237
dc.descriptionThesis: S.M. in Engineering and Management, Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Program, 2019en_US
dc.descriptionCataloged from PDF version of thesis. "Due to the condition of the original material, there are unavoidable flaws in this reproduction. We have made every effort possible to provide you with the best copy available. The images contained in this document are of the best quality available"--Disclaimer Notice page.en_US
dc.descriptionIncludes bibliographical references (pages 165-180).en_US
dc.description.abstractRecent cyberattacks on the electricity grids in the U.S. and Ukraine, the rise of malware tailored to industrial control systems, failure of basic sanitary and life-saving systems after prolonged power outages, economic losses numbering in the billions: these are the consequences of malware attacks on critical infrastructure sectors across the globe. New and continuously evolving cyber threats demand new and better response mechanisms to mitigate their effects. However, critical infrastructure sectors, and the electricity subsector in particular, are faced with the enormous challenge of identifying gaps in their extremely complex cyber incident response mechanisms. This thesis takes a novel, systems-level approach to pinpoint deficiencies in incident response mechanisms of the U.S. electricity sector. An analysis of current and future external influences on the electricity sector validates that malware threats and vulnerabilities are rapidly evolving and are already outpacing the sector's ability to adapt its cyber incident response mechanisms. Using the Architecting Innovative Enterprise Strategies (ARIES) Framework to explore current incident response mechanisms reveals that the traditional, all-hazards approach to major incident response is insufficient to keep the grid secure. Instead, improvements in cyber incident response strategies, processes, organizations, information flow, products, and services are all necessary to overcome the disparity. Most importantly, the systems-level approach exposes the culture of cybersecurity in the sector is the systemic driver of those shortfalls and must be the primary consideration for improvement to the electricity sector's cyber incident response mechanisms.en_US
dc.description.statementofresponsibilityby Michael Louis Sapienza.en_US
dc.format.extent180 pagesen_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsMIT theses may be protected by copyright. Please reuse MIT thesis content according to the MIT Libraries Permissions Policy, which is available through the URL provided.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectEngineering Systems Division.en_US
dc.subjectSystem Design and Management Program.en_US
dc.titleAnalysis of energy delivery sector malware attack response mechanismsen_US
dc.typeThesisen_US
dc.description.degreeS.M. in Engineering and Managementen_US
dc.contributor.departmentMassachusetts Institute of Technology. Engineering Systems Divisionen_US
dc.contributor.departmentSystem Design and Management Program.en_US
dc.identifier.oclc1342000007en_US
dc.description.collectionS.M. in Engineering and Management Massachusetts Institute of Technology, Engineering Systems Division, System Design and Management Programen_US
dspace.imported2022-08-31T16:29:35Zen_US
mit.thesis.degreeMasteren_US
mit.thesis.departmentSloanen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record