Allan Cook

Allan Cook
De Montfort University | DMU · Department of Computer Technology

About

17
Publications
19,137
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
260
Citations
Citations since 2017
13 Research Items
260 Citations
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
20172018201920202021202220230102030405060
Introduction
Skills and Expertise

Publications

Publications (17)
Article
Incident response teams cannot prepare for every situation or predict every crisis, especially when they involve cyber-physical systems. As a result, training activities need to be provided to support operating in challenging situations to develop concrete guidance, procedures, and tools to help individuals collectively react in different, unpredic...
Conference Paper
The NIS Directive introduces obligations for the security of the network and information systems of operators of essential services and of digital service providers and require from the national competent authorities to assess their compliance to these obligations. This paper describes a novel cybersecurity maturity assessment framework (CMAF) that...
Article
Full-text available
As organisations are vulnerable to cyber attacks, their protection becomes a significant issue. 1 Capability Maturity Models can enable organisations to benchmark current maturity levels against best practices. 2 Although many maturity models have been already proposed in the literature, a need for models that integrate 3 several regulations exists...
Preprint
Full-text available
The NIS Directive introduces obligations for the security of the network and information systems of operators of essential services and of digital service providers and require from the national competent authorities to assess their compliance to these obligations. This paper describes a novel cybersecurity maturity assessment framework (CMAF) that...
Chapter
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding of the nature of the threat, cyber security may not be...
Article
Industrial control systems (ICS) are an essential element of critical national infrastructure, often managing processes and utilities that are essential to a nation's wellbeing and prosperity. These systems are increasingly the target of cyber attacks, and thus are required to adopt a stronger cyber defence posture. The integration of industrial in...
Technical Report
Full-text available
The synergy between the cloud and the IoT has emerged largely due to the cloud having attributes which directly benefit the IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: 1) to analyse the different components of Cloud computing and the IoT and 2)...
Article
The threat to Industrial Control Systems (ICS) from cyber attacks is widely acknowledged by governments and literature. Operators of ICS are looking to address these threats in an effective and cost-sensitive manner that does not expose their operations to additional risks through invasive testing. Whilst existing standards and guidelines offer com...
Chapter
The synergy between Cloud and IoT has emerged largely due to the Cloud having attributes which directly benefit IoT and enable its continued growth. IoT adopting Cloud services has brought new security challenges. In this book chapter, we pursue two main goals: (1) to analyse the different components of Cloud computing and IoT and (2) to present se...
Article
Industrial control systems (ICS) are increasingly becoming the target of cyber attacks. In order to counter this threat, organisations are turning to traditional IT security mechanisms to protect their operations. However, ICS includes a range of technologies which are often unfamiliar to contemporary IT security professionals or the tools they dep...
Article
The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding of the nature of the threat, cyber security may not be...
Article
Industrial control systems (ICS) are increasingly becoming the target of cyber attacks. In order to counter this threat, organisations are turning to traditional IT security mechanisms to protect their operations. However, ICS includes a range of technologies which are often unfamiliar to contemporary IT security professionals or the tools they dep...
Article
Industrial control systems are an essential element of critical national infrastructure, often managing processes and utilities that are essential to a nation's well being and prosperity. These systems are increasingly becoming the target of cyber attacks, and as a result are required to adopt a stronger cyber defense posture. In the next years, th...
Article
Full-text available
In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse. In this paper we identify the current state of the art of attribution in industr...

Network

Cited By

Projects

Project (1)