ABSTRACT
In the contest of industrial process and automation, and in particular in the so-called Industry 4.0, the now intensive application of control systems in interconnected networks has led to an increase in unexpected threats to information security for supervisory control and data acquisition (SCADA) and control systems distributed (DCS).
Risk assessment is essential and the its common methods such as HHM, IIM, and RFRM have been successfully applied to SCADA systems.
Another equally important need is the use of metrics and methodologies to analyze the risk (PRA- probability risk analysis), which includes methods such as FTA, ETA and FEMA and HAZOP. The goal of these methods is, in general, to determine the impact of a problem on the process plant and the risk reduction associated with a particular countermeasure.
In this paper we present a methodology named CRiSP (Cyber Risk Analysis in Industrial Process System Environment). CRiSP defines an approach to analyze the risk related to the manipulation of a single element of the plant and to analyze the consequence to entire plant and in the same time to a restricted portion.
- Cabinet Office, Strategic Framework and Policy Statement on Improving the Resilience of Critical Infrastructure to Disruption from Natural Hazards, 2010.Google Scholar
- A. Daneels and W. Salter, "What is SCADA?," International Conference on Accelerator and Large Experimental Physics Control Systems, pp. 339--343, 1999.Google Scholar
- V. M. Igure, S. A. Laughter, and R. D. Williams, "Security issues in SCADA networks," Computers and Security, vol. 25, no. 7, pp. 498--506, 2006. Google ScholarDigital Library
- M. Henrie, "Cyber security risk management in the SCADA critical infrastructure environment," Engineering Management Journal, vol. 25, no. 2, pp. 38--45, 2013.Google ScholarCross Ref
- J. Guan, J. H. Graham, and J. L. Hieb, "A digraph model for risk identification and mangement in SCADA systems," presented at the Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, ISI 2011, 2011, pp. 150--155.Google Scholar
- S. Patel, R. Tantalean, P. Ralston, and J. Graham, "Supervisory control and data acquisition remote terminal unit testbed," Intelligent Systems Research Laboratory Technical Report TR-ISRL-05--01, 2005.Google Scholar
- NIST, "System Protection Profile-Industrial Control Systems v1.0," System protection profile - industrial control systems, 2004.Google Scholar
- U. D. of Energy, "21 Steps to Improve Cyber Security of SCADA Networks," White Paper, 2005.Google Scholar
- NIST, Special Publication 800--82. Guide to Industrial Control Systems (ICS) Security, 2011.Google Scholar
- ENISA, Window of exposure a real problem for SCADA systems? Recommendations for Europe on SCADA patching, 2013.Google Scholar
- NERG, Project 2014--02 critical infrastructure protection standards version 5 revisions, 2014.Google Scholar
- A. Nicholson, S. Webber, S. Dyer, T. Patel, and H. Janicke, "SCADA security in the light of cyber-warfare," Computers and Security, vol. 31, no. 4, pp. 418--436, 2012. Google ScholarDigital Library
- B. Miller and D. C. Rowe, "A survey of SCADA and critical infrastructure incidents," presented at the RIIT'12 - Proceedings of the ACM Research in Information Technology, 2012, pp. 51--56. Google ScholarDigital Library
- M. Cheminod, L. Durante, and A. Valenzano, "Review of security issues in industrial networks," IEEE Transactions on Industrial Informatics, vol. 9, no. 1, pp. 277--293, 2013.Google ScholarCross Ref
- H. M. Leith and J. W. Piper, "Identification and application of security measures for petrochemical industrial control systems," Journal of Loss Prevention in the Process Industries, vol. 26, no. 6, pp. 982--993, 2013.Google ScholarCross Ref
- S. Kaplan and B. J. Garrick, "On The Quantitative Definition of Risk," Risk Analysis, vol. 1, no. 1, pp. 11--27, 1981.Google ScholarCross Ref
- ISO, ISO/IEC 27001:2005, Information Technology - Security Techniques - Information Security Management Systems - Requirements, 2015.Google Scholar
- C. Alberts, A. Dorofee, J. Stevens, and C. Woody, "Introduction to the OCTAVE Approach," Introduction to the OCTAVE Approach, 2003.Google ScholarCross Ref
- Z. Yazar, "A qualitative risk analysis and management tool--CRAMM," SANS InfoSec Reading Room White Paper, vol. 11, pp. 12--32, 2002.Google Scholar
- J. Ø. Aagedal, F. Den Braber, T. Dimitrakos, B. A. Gran, D. Raptis, and K. Stolen, "Model-based risk assessment to improve enterprise security," presented at the Proceedings - 6th International Enterprise Distributed Object Computing Conference, 2002, vol. 2002-January, pp. 51--62. Google ScholarDigital Library
- B. Karabacak and I. Sogukpinar, "ISRAM: Information security risk analysis method," Computers and Security, vol. 24, no. 2, pp. 147--159, 2005. Google ScholarDigital Library
- L. C. Briand, K. El Emam, and F. Bomarius, "COBRA: A hybrid method for software cost estimation, benchmarking, and risk assessment," presented at the Proceedings - International Conference on Software Engineering, 1998, pp. 390--399. Google ScholarDigital Library
- R. S. Coles and R. Moulton, "Operationalizing IT risk management," Computers and Security, vol. 22, no. 6, pp. 487--493, 2003. Google ScholarDigital Library
- G. Giannopoulos, R. Filippini, and M. Schimmer, "Risk assessment methodologies for critical infrastructure protection. Part I: a state of the art," Technical Notes. European Commission Joint Research Centre Institute for the Protection and Security of the Citizen Luxembourg EUR 25286 EN-2012, 2012.Google Scholar
- P. Kertzner, D. Bodeau, R. Nitschke, J. Watters, M. Young, and M. Stoddard, Process Control System Security Technical Risk Assessment Analysis of Problem Domain, 2005.Google Scholar
- P. A. S. Ralston, J. H. Graham, and J. L. Hieb, "Cyber security risk assessment for SCADA and DCS networks," ISA Transactions, vol. 46, no. 4, pp. 583--594, 2007.Google ScholarCross Ref
- Y. Cherdantseva et al., "A review of cyber security risk assessment methods for SCADA systems," Computers & Security, vol. 56, pp. 1--27, Feb. 2016. Google ScholarDigital Library
- F. Farahmand, S. B. Navathe, G. P. Sharp, and P. H. Enslow, "Managing Vulnerabilities of Information Systems to Security Incidents," presented at the Proceedings of the ACM Conference on Electronic Commerce, 2003, vol. 5, pp. 348--354. Google ScholarDigital Library
- Y. Y. Haimes, "Hierarchical Holographic Modeling," IEEE Transactions on Systems, Man and Cybernetics, vol. 11, no. 9, pp. 606--617, 1981. Y. Y. Haimes, Risk Modeling, Assessment, and Management, 1998.Google ScholarCross Ref
- C. G. Chittester and Y. Y. Haimes, "Risks of terrorism to information technology and to critical interdependent infrastructures," Journal of Homeland Security and Emergency Management, vol. 1, no. 4, pp. 25--46, 2004.Google ScholarCross Ref
- K. G. Crowther and Y. Y. Haimes, "Application of the inoperability input-output model (IIM) for systemic risk assessment and management of interdependent infrastructures," Systems Engineering, vol. 8, no. 4, pp. 323--341, 2005. Google ScholarDigital Library
- M. Stamatelatos, W. Vesely, J. Dugan, J. Fragola, J. Minarick, and J. Railsback, "Fault tree handbook with aerospace applications," 2002.Google Scholar
- H. Kumamoto and E. J. Henley, Probabilistic Risk Assessment and Management for Engineers and Scientists, 1996.Google Scholar
- Lipol, Lefayet Sultan, and Jahirul Haq. "Risk analysis method: FMEA/FMECA in the organizations." International Journal of Basic & Applied Sciences 11.5 (2011): 74--82.Google Scholar
- Walker, Mark, and Ravi Kapadia. "Integrated Design of Online Health and Prognostics Management." Annual Conference of the Prognostics and Health Management Society. 2009.Google Scholar
- B. Vesely, "Fault tree analysis (FTA): Concepts and applications," NASA HQ, 2002.Google Scholar
- L. Scott, "Baldrige Cybersecurity Initiative," 2016.Google Scholar
Index Terms
- Model-Driven approach to Cyber Risk Analysis in Industry 4.0
Recommendations
Principles and procedures of the LRAM approach to information systems risk analysis and management
Risk assessment methods vary in nature and depth. Their application to the evaluation of information security issues should be decided on the basis of their capability to provide answers to the fundamental questions concerning the design and ...
Taxonomy of information security risk assessment (ISRA)
Information is a perennially significant business asset in all organizations. Therefore, it must be protected as any other valuable asset. This is the objective of information security, and an information security program provides this kind of ...
A comparative framework for risk analysis methods
The past decade has shown the importance of information security, with special emphasis on network security, disaster recovery and risk management. A number of automated approaches for the facilitation of a risk analysis study have appeared on the ...
Comments