TY - GEN
T1 - Cybersecurity Threats, Vulnerabilities, Mitigation Measures in Industrial Control and Automation Systems
T2 - 2022 Cyber Research Conference - Ireland, Cyber-RCI 2022
AU - Ocaka, Alfred
AU - Briain, Diarmuid O.
AU - Davy, Steven
AU - Barrett, Keara
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Cyberattacks on Industrial Control and Automation Systems (ICAS) have significantly increased in recent years due to IT and OT convergence. Traditionally, ICAS were isolated systems running proprietary protocols on specialised software and hardware. However, to improve business processes and efficiency, ICAS vendors are adopting smart technologies such as Industrial Internet of Things (IIOT), Machine to Machine (M2M), Digital Twin, cloud computing, and Artificial Intelligence (AI). This integration presents new vulnerabilities in ICAS that can be exploited by threat actors. ICAS are utilised in critical infrastructure and widely used in power, nuclear plant, water, oil, natural gas, and manufacturing industries. Therefore, cyberattacks on these systems can pose a significant threat to humans and the environment, disrupt social services, cause financial losses, and threaten national security. Because of these threats, numerous mitigation measures are being implemented to protect ICAS from cyberattacks. However, security experience and expertise have demonstrated that we can never fully protect a system and one should never propose that their solution will fully protect. Rather one can claim that their solution/mitigation technique adds a layer to the defence in depth approach.
AB - Cyberattacks on Industrial Control and Automation Systems (ICAS) have significantly increased in recent years due to IT and OT convergence. Traditionally, ICAS were isolated systems running proprietary protocols on specialised software and hardware. However, to improve business processes and efficiency, ICAS vendors are adopting smart technologies such as Industrial Internet of Things (IIOT), Machine to Machine (M2M), Digital Twin, cloud computing, and Artificial Intelligence (AI). This integration presents new vulnerabilities in ICAS that can be exploited by threat actors. ICAS are utilised in critical infrastructure and widely used in power, nuclear plant, water, oil, natural gas, and manufacturing industries. Therefore, cyberattacks on these systems can pose a significant threat to humans and the environment, disrupt social services, cause financial losses, and threaten national security. Because of these threats, numerous mitigation measures are being implemented to protect ICAS from cyberattacks. However, security experience and expertise have demonstrated that we can never fully protect a system and one should never propose that their solution will fully protect. Rather one can claim that their solution/mitigation technique adds a layer to the defence in depth approach.
KW - Industrial Control and Automation Systems
KW - Industrial Cybersecurity standards and frameworks
KW - Industrial Protocols
KW - Threats and Vulnerabilities in Industrial Control and Automation Systems
UR - https://www.scopus.com/pages/publications/85148643553
U2 - 10.1109/Cyber-RCI55324.2022.10032665
DO - 10.1109/Cyber-RCI55324.2022.10032665
M3 - Conference contribution
AN - SCOPUS:85148643553
T3 - 2022 Cyber Research Conference - Ireland, Cyber-RCI 2022
BT - 2022 Cyber Research Conference - Ireland, Cyber-RCI 2022
PB - Institute of Electrical and Electronics Engineers Inc.
Y2 - 25 April 2022
ER -