Uchenna Ani u.d.ani@keele.ac.uk
Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach
Ani, Uchenna Daniel; Watson, Jeremy; He, Hongmei; Radanliev, Petar; Epiphaniou, Gregory
Authors
Jeremy Watson
Hongmei He
Petar Radanliev
Gregory Epiphaniou
Abstract
Organisations operating IoT-enabled industrial control systems (ICSs) are concerned about growing cybersecurity risks and impacts to their systems. Cyber-attacks on ICSs demonstrate that technology alone is neither a problem nor a solution to the growing cybersecurity issues affecting these systems. As socio-technical systems, ICSs encompass the functions and interactions of social and technological system elements to enable and/or sustain industrial processes. Thus, a more effective cybersecurity risk management process needs to consider human and technology factors, especially for high-value industrial process targets. Combining critical reviews and gap analysis of existing vulnerability assessment methods with conceptual modelling, a Vulnerability Analysis Critical Impact Point Process (VACIP) methodology is proposed which considers both human and technological vulnerabilities within a cyber-physical system environment to inform an improved insight about attack criticality and impacts. VACIP is validated using a simulated industrial mini testbed; showing that it can enable practicable support for security vulnerability discovery, impact criticality analysis, weak link identification, and prioritised controls. Its novelty is demonstrated in its combination of technology and human vulnerability evaluations in the minimisation of system security exposures. It provides a useful guide for adopting effective cybersecurity risk assessment and exposure reduction strategies
Citation
Ani, U. D., Watson, J., He, H., Radanliev, P., & Epiphaniou, G. (in press). Minimising cybersecurity risk exposures in industrial control system environments: a techno-human vulnerability analysis approach. Journal of Cyber Security Technology, 1-40. https://doi.org/10.1080/23742917.2024.2421589
Journal Article Type | Article |
---|---|
Acceptance Date | Oct 2, 2024 |
Online Publication Date | Nov 10, 2024 |
Deposit Date | Dec 5, 2024 |
Journal | Journal of Cyber Security Technology |
Print ISSN | 2374-2917 |
Electronic ISSN | 2374-2925 |
Publisher | Taylor and Francis Group |
Peer Reviewed | Peer Reviewed |
Pages | 1-40 |
DOI | https://doi.org/10.1080/23742917.2024.2421589 |
Keywords | security vulnerability analysis, security risk analysis, security risk impact analysis, risk management, socio-technical security |
Public URL | https://keele-repository.worktribe.com/output/984803 |
You might also like
Digital twins in cyber effects modelling of IoT/CPS points of low resilience
(2023)
Journal Article
Industrial Internet of Things Security Modelling using Ontological Methods
(2023)
Conference Proceeding
Super-forecasting the 'technological singularity' risks from artificial intelligence
(2022)
Journal Article
Downloadable Citations
About Keele Repository
Administrator e-mail: research.openaccess@keele.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search