2016
DOI: 10.1080/23742917.2016.1252211
|View full text |Cite
|
Sign up to set email alerts
|

Review of cybersecurity issues in industrial critical infrastructure: manufacturing in perspective

Abstract: Nowadays, the industrial sector is being challenged by several cybersecurity concerns. Direct attacks by malicious persons and (or) software form part of the severe jeopardies of industrial control systems (ICSs). These affect products/production qualities, brand reputations, sales revenues, and aggravate the risks to health and safety of human lives. These have been enabled due to progressive adoption of technology trends like Industry 4.0, BYOD, mobile computing, and Internet-of-Things (IoT), in the quest fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
66
0
2

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 153 publications
(68 citation statements)
references
References 52 publications
0
66
0
2
Order By: Relevance
“…For example, attackers can gain access to computing platforms and manipulate systems measurement data which can compromise systems performance and integrity, and hence, security and safety in cyber-physical systems. Therefore, the issues of data security also required special consideration from supply chain perspectives as companies are increasingly dependent on information, which may well originate beyond a single company (Ani et al 2017). Cyber security is valued as a major challenge in supply chain, as this technique can compromise companies and make them inevitably lose control over customers' and products' propriety information.…”
Section: Security Issuesmentioning
confidence: 99%
“…For example, attackers can gain access to computing platforms and manipulate systems measurement data which can compromise systems performance and integrity, and hence, security and safety in cyber-physical systems. Therefore, the issues of data security also required special consideration from supply chain perspectives as companies are increasingly dependent on information, which may well originate beyond a single company (Ani et al 2017). Cyber security is valued as a major challenge in supply chain, as this technique can compromise companies and make them inevitably lose control over customers' and products' propriety information.…”
Section: Security Issuesmentioning
confidence: 99%
“…Asset identification and cascading vulnerabilities were not considered as a result of the interdependency between assets. A previous work [36] offers an insightful review of the possible solution paths to understand the industrial control systems security trends in relation to cyber threats, vulnerabilities, attacks, and impacts on the industrial control system (ICS). The work did not implement any practical approach to identify assets, assess vulnerabilities, threats, and mitigate risks, but only suggested some techniques.…”
Section: Comparison With Existing Study Resultsmentioning
confidence: 99%
“…Vulnerability assessment follows different techniques, in our case, we will follow a checklist of all possible vulnerabilities associated with each critical asset, how many different assets are affected by one or many vulnerabilities, and finally how vulnerability cascade to affecting another vulnerability, therefore, causing the occurrence of a threat. The vulnerability is an exposure to security that results in the weakness of a critical asset allowing for the compromise of any of the security objectives [36], and is defined as 'the measure of the susceptibility of a system to threat' [37]. Identification and assessing vulnerability is an important and a delicate task that has an impact on the successful operation of assets that provide CPS services.…”
Section: Activity 3: Vulnerability Assessment and Threat Identificationmentioning
confidence: 99%
“…The main difference between the two systems is that the IT environment essentially manages data, while the ICS manages the physical environment [21]. Over time, the advancement of communication technologies combined with a reduction in costs have attracted ICS to embrace the IT communication technologies.…”
Section: Ics Vs It Environmentsmentioning
confidence: 99%