Consequence-driven cyber-informed engineering (CCE)
- Idaho National Lab. (INL), Idaho Falls, ID (United States)
The Idaho National Lab (INL) is leading a high-impact, national security-level initiative to reprioritize the way the nation looks at high-consequence risk within the industrial control systems (ICS) environment of the country’s most critical infrastructure and other national assets. The Consequence-driven Cyber-informed Engineering (CCE) effort provides both private and public organizations with the steps required to examine their own environments for high-impact events/risks; identify implementation of key devices and components that facilitate that risk; illuminate specific, plausible cyber attack paths to manipulate these devices; and develop concrete mitigations, protections, and tripwires to address the high-consequence risk. The ultimate goal of the CCE effort is to help organizations take the steps necessary to thwart cyber attacks from even top-tier, highly resourced adversaries that would result in a catastrophic physical effect. CCE participants are encouraged to work collaboratively with each other and with key U.S. Government (USG) contributors to establish a coalition, maximizing the positive effect of lessons-learned and further contributing to the protection of critical infrastructure and other national assets.
- Research Organization:
- Idaho National Laboratory (INL), Idaho Falls, ID (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- AC07-05ID14517
- OSTI ID:
- 1341416
- Report Number(s):
- INL/EXT-16-39212
- Country of Publication:
- United States
- Language:
- English
Similar Records
CCE Phase 1: Consequence Prioritization
CCE and Resilience Strategies
Related Subjects
cyber security
cyber-informed
cyber-informed engineering
threat analysis
consequence prioritization
Mission Support Center
electric grid security
critical infrastructure protection
Consequence-Driven Cyber-Informed Engineering
CIE
CCE
Cybersecurity Resilience
Consequence-based Targeting
Energy Transition
Integrating Cybersecurity
Cyber Risk
Cyber Supply Chain Risk
Cyber-Resilience
Cyber
Cyber Threat and Vulnerability