An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System
Abstract
:1. Introduction
2. Related Work
2.1. Security Risks Management for Cyber-Physical System
2.2. Cyber Security in Smart Grid
2.3. Frameworks/Standards/Guidelines
- Cherdantseva et al. [9] reviewed existing cyber security risk assessment works and concluded that it is necessary to have a comprehensive risk management method which will cover all stages of the risk management process.
- Different risk management approaches for smart grid were also discussed in a previous work [21]. However, risk management from a holistic perspective that incorporates all aspects of a smart grid and their interdependencies is needed.
- Most of the risk management approaches emphasize assessing vulnerabilities and identifying threats but lack emphasis on the cascading effect of vulnerabilities and threats to the asset.
- The existing works provide limited efforts in considering the estimation of an accurate risk level for the organization.
3. The Rationale for an Integrated Risk Management Approach
- Integration of stakeholder’s model: The integration of the stakeholder’s model for risk management is a means of achieving greater inclusivity in an organization, and it is important for an organization to understand its own security risk management practices. This approach shows the importance of security from each and every area of the business enterprise of a critical infrastructure organization by making it clear to managers and subsequently enhancing employee commitment. In a traditional security risk assessment having just one stakeholder, which could be the compliance manager or security director, the value of the security risk assessment process is limited. An integrated risk management approach seeks to relate vulnerability findings and IT control gaps in the context of how such findings may affect attackers, users, government, shareholders, regulatory authorities, numerous individuals, or groups across an organization. It also deals with the human issues for risk management.
- Measurement of cross-functional risks from organizational context: An effective risk management method renders a successful management of various factors that prevent organizations from achieving their desired security objectives. Risks depicted through an integrated risk management approach become cross-functional (i.e., a system whereby people from different areas of an organization work together as a team considering both technical and nontechnical perspectives), and the approach draws an obvious conclusion on how risks affect regulatory requirements, the supply management chain, and the goals or KPSs of the organization and its security objectives. The approach will provide a better understanding of cross-functional risks amongst control objectives that may have been impacted by technical or process-based vulnerabilities and will give attention to any higher risks. Cross-functional risks include technical risks and nontechnical risks such as software risk, system complexity and vulnerabilities, environmental risk, legal security, etc. As the approach captures different information from different stakeholders, security issues are shared across the organization and weighed appropriately in light of the management’s level of criticality for each business and control function.
- Builds upon existing frameworks/standards/guidelines: An integrated risk management approach builds upon existing frameworks by evaluating how the combination of neglected risk factors could yield minor to terrible outcomes. A state-of-the-art and well-known approach can smoothly lead an organization beyond simple compliance and reveal how to more effectively secure a particular information environment. The approach understands regulatory requirements and can translate them into control objectives for the organization. The existing frameworks and standards that will be considered for the risk management process will include, the NIST framework, ISO 31000:2009, ISO 27001:2013, and goal-driven risk management framework which will provide guidelines for risk management activities and also considers risk management as an important aspect of the overall organizational process [24,25,28,29].
4. An Integrated Risk Management Approach
4.1. Modeling Concepts
- Actor: An actor is an entity, generally a human user, a system, an organization, or a process each with a specific strategic goal within its organizational setting and carries out specific activities to generate cybersecurity risk management actions or receive the generated cybersecurity risk management actions by another actor [31]. This requires the organization to appoint efficient actors to carry out various tasks to guide and lead in achieving its goals. The actors are identified as stakeholders, such as government employees, IT providers, and utilities, employees, consumers, owners and operators, customers, users, and providers with skills within a particular location.
- Goals: Goals signify the overall aims and objectives of an actor which supports the interest and continuity of the business. There are expectations to support the organization and include the KPIs of the organization, security, and organizational goals. KPIs allow the critical infrastructure organization actors to make a keen decision about the organization’s continuity; they include confidentiality, availability, and integrity.
- Risks: Risk can be defined as the possibility of an unwanted outcome as a result of an incident, event, or occurrence, as determined by its likelihood and the associated consequences. The risk is inevitable in a business, however, it is the role of the actors to ensure that risks are kept to a minimum to achieve the goals. Once the risk has been identified, it is necessary to have a mitigation plan or any other solution to counterattack the risk. Risks are the potential consequences of the system and could possibly compromise the security of the CPS and not meet the actor’s expectations. A CPS risk could be classified under security, operational, nontechnical, technical, and governance or regulatory parameters. These risks could obstruct the security of the CPS and require an appropriate assessment. The risk assessment will be based on likelihood, impact, and residual analysis, which helps in identifying which risk needs to be controlled by following different control strategies.
- Assets. Assets are defined as tangible or intangible entities which are necessary and have values to the CPS organization. Identification of key assets, and putting a value on each key asset, is an important process of risk management. These key assets could be people, services, facilities, processes, etc. It is important to identify critical assets as well as estimate their critical failure modes or impact of the loss. An asset has two features: (i) criticality and (ii) category. Criticality is defined as a measure of the consequences associated with the degradation or loss of an asset. It is the major indicator used by organizations to determine which asset is of more value to the business continuity. Category classifies assets according to its level of sensitivity and security requirements. The criticality of an asset category can be high, medium, or low, which means that assets with high rating are the most valuable to the organization.
- Controls. The set of security protections or countermeasures to avoid or minimize security risks in CPS critical infrastructure are called controls. Controls are also the mechanism used to provide security to the CPS, and they are characterized by combining technical and nontechnical controls which are used to deter anticipated and unanticipated threats from exploiting known vulnerabilities. They also describe the vital components and actions taken to protect the assets. The overall goal of risk assessment will be partly defeated if relevant controls are not applied.
- Compliance Programs: These are sets of requirements designed to secure the CPS to operate without any form of disturbance. Critical infrastructures are increasingly using compliance programs as a mechanism for demonstrating cybersecurity for CPS protection. The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) is a compliance program designed to secure the assets necessary for operating a bulk electric system. In this case, the SCADA system of the CPS is an asset. Therefore, a significant sum of their budget and time is necessary to ensure security compliance with standards such as NERC CIP, NIST, NIPP, and other relevant standards.
- Cyber-attack scenario: A cyber-attack scenario is an event that leads to a negative impact on the organization’s assets when it occurs. There are some certain components that determine a cyber-attack on a CPS. They include threat types, actor’s skill, capability and location, assets, events, and time. With certain scenarios, the organization tends to think broadly by developing a range of possible outcomes to increase their readiness for a range of possibilities in the future.
- Policy: Policies are the principles of action adopted or proposed by an organization. There are a number of security policies, such as access control and backup that are necessary to formulate and implement the CPS security program.
- Threats and vulnerabilities: Vulnerability is the weakness in an organization security program that is exploited by a threat to gain unauthorized access to an asset. It has three properties. i.e., impact, type, and weight score.
4.2. Risk Management Process
4.2.1. Activity 1: Risk Management Context
- Physical interdependency: This refers to two or more infrastructures that are physically interdependent if the operation of one infrastructure depends on the physical output of the other.
- Cyber interdependency: Refers to the state of an infrastructure depending on the information communicated through the information infrastructure.
- Logical interdependencies: This type of interdependency occurs when the state of each infrastructure depends on the state of the other through controls, mechanisms, regulatory or otherwise, that cannot be considered cyber, physical, or geographical.
- Geographical independencies: This kind of interdependency occurs when elements of multiple infrastructures are in the same remote area. In this case, natural disasters can cause an element of one infrastructure to create failure in one or more infrastructures within close vicinity.
- Confidentiality (C): This KPI deals with the disclosure of sensitive data against unauthorized users, CPS internal users, external users, and malicious attackers. It involves the deletion and transfer of data between authorized users in a secure environment to prevent data leakage.
- High availability (A): Availability refers to ensuring that the assets of the critical infrastructure are made available and accessible to the end users as agreed, or when and where they need it. It defines the degree or extent to which the asset is readily usable along with the necessary IT and management procedures, tools, and technologies required to enable, manage, and continue to make it available.
- Integrity (I): Integrity refers to the ability of critical infrastructure organizations assets to perform their required functions effectively and efficiently without any disruption or loss of service. It includes the critical aspect of any asset which stores, processes, and retrieves data, its design, implementation, and usage. Integrity ensures that the data managed by systems and messages communicated over the network altered by unauthorized users.
- Resiliency (R): This KPI allows for the CPS to be able to work on an acceptable level of efficiency even when external or internal disturbances occur.
- Reputation (RE): Reputation is the trust and confidence the organization has gained by the public or given to the public.
- Authenticity (AUT): This KPI improves the identification and verification technology of an authorized user in order to provide security, ease of use, and administration. It has the capacity to identify an authorized user to its specific appropriate information and service type.
- Nonrepudiation (NR): This KPI provides certifiable evidence of a message being delivered to both communication endpoints in order to ensure that either the sender or the receiver does not deny sending and/or receiving the message.
- Maintainability (M): Maintainability is associated with the mean time to repair (MTTR) an asset and get it to work perfectly within a specified period of time. The time could be categorized as less than a day, several days, one week, several weeks, month(s), or even a year.
4.2.2. Activity 2: Assets Identification and Criticality
- Noncritical level 0.01–3.99.
- A reasonably critical level 4.00–7.99.
- An extremely critical level 8.00–10.00.
- IV = Impact value will range from 1.00–10.0.
- W = Weight score will range from 0.01–1.00.
4.2.3. Activity 3: Vulnerability Assessment and Threat Identification
4.2.4. Activity 4: Risk Assessment
- L(S) = the likelihood of the occurrence of the scenario S.
- i = 1, 2, 3… n. The number of each incident that could result in a scenario occurring.
- Ri = risk; S = a scenario; L = likelihood; VI = vulnerability impact.
- Level 1: At this level the attacker has insufficient knowledge, skill, and/or resources to perform a successful attack. This attacker is most likely to be found in any of the three locations mentioned above.
- Level 2: At this level, the attacker has moderate skill level and resources to exploit one known vulnerability successfully, and the attacker is most likely to be found in the three locations mentioned above.
- Level 3: In this level, the attacker is an expert with sufficient level of skills and resources to exploit at least one known vulnerability successfully and the attacker is most likely to be found within the network as an internal attacker, end-to-end, an external attacker, or a physical attacker.
4.2.5. Activity 5: Risk Control
- Avoidance: Risk avoidance involves eliminating risks that can negatively affect an organizations asset. Risk avoidance looks for ways to avoid compromising events completely by taking measure to ensure that threats do not occur. However, it is almost impossible to avoid all risks completely.
- Reduction: Risk reduction involves the lessening of vulnerabilities and threats events that affect the continuity of a critical process by creating contingency plans to enable critical infrastructure organizations to continue operating under recovery management. With risk reduction, the impact of a risk is limited so that it does not occur, and if it does occur, the problem will be easier to repair. The reduction can be against the impact and likelihood of the event occurring and implementing controls to reduce the risk to an acceptable level.
- Prevention: This measure should deter or avoid the risk event that can cause a negative impact on the critical infrastructure organization. Realistic preventive actions such as business continuity are put in place for effective risk control during cybersecurity risk management.
- Acceptance: This control strategy mainly involves taking no action by accepting the present level of the evaluated risk. Risk acceptance is a good strategy when the impact of the risk to the organization is very small.
- Transfer: The risk transfer measure basically shifts risks to other contract partners or enterprises, mainly to reduce the financial impact on the critical infrastructure organization or the responsibility of implementing the mitigating controls.
4.2.6. Activity 6: Risk Monitor and Residual Risk
5. Evaluation
5.1. Study Goal
- understand the risks associated with a CPS.
- identify suitable control management methods for the risks in a proactive manner.
- achieve feasibility of the integrated risk management method for CPS.
5.2. Data Collection and Analysis
5.3. Study Context
5.4. Introduction to the Integrated Risk Management Process
5.4.1. Activity 1: Risk Management Context
5.4.2. Activity 2: Assets Criticality
5.4.3. Activity 3: Vulnerability Assessment and Threat Identification
5.4.4. Activity 4: Risk Assessment
- Scenario 1: A highly skilled external attacker gained access to the master terminal unit (MTU) of the power grid system through a remote access point exploiting the weak password and firewall. The attacker was able to disrupt communications, access critical data such as passwords and operating plans, and thereby, monitor the status of the system and inject malicious control commands as well as forge data into the control center. This action led the system operators into taking inappropriate actions that interrupted the availability of electricity.
- Scenario 2: Due to a heavy rainfall, a fallen tree branch damaged the overhead power lines feeding the substation. This interrupted the supply causing the socket breaker for this line to trip at the primary substation, leading to a total power outage to some parts of the area including the local ports and few hospitals. However, the operator did not get any notification of the socket breaker trip and therefore did not assign the maintenance crew to the specific area of the faulty network; this left customers without supply for 18 h.
- Scenario 3: An endpoint skilled customer who has a bakery and requires (uses more electricity), the biggest running cost for such an operation is the electricity bill. The customer, therefore, modifies the meter reader by cracking the smart meter password and was able to reprogram and reset the smart meter. The dishonest customer was able to change the meter reading to a lower value than the actual one to reduce his electricity bill.
- Scenario 1:VI = V3.5VR5 + V3.6VR4 + V1.4VR3/3
VI = 13/3 = 4.33
Ri = 0.93 × 4.33 = 3.85Based on scenario 1, three vulnerabilities were identified and the impact of the vulnerability is 4.33, which means that the vulnerability is medially rated. Therefore, the likelihood of the attack scenario occurring is 3.85 and it is almost certain to occur. - Scenario 2:VI = V3.6VR4 + V3.4VR2 + V3.5VR3/3
VI = 9/3 = 3.00
Ri = 0.78 × 3.00 =2.34Based on scenario 2, three vulnerabilities were identified and the impact of the vulnerability is 3.00, which means that the vulnerability is average. Therefore, the likelihood of the attack scenario occurring is 2.34 and it is likely to occur. - Scenario 3:VI = V3.2VR3 + V1.3VR4 + V2.2VR5/3
VI = 12/3 = 4.00
Ri = 1.00 × 4.00 =4.00Based on scenario 3, three vulnerabilities were identified and the impact of the vulnerability is 4.00. Therefore, the likelihood of the attack scenario occurring is 4.00 and it is almost certain to occur.
- Scenario 1: The attacker bridged confidentiality, availability, and integrity by disrupting communications and gaining access to passwords, and authenticity by gaining access to the communication systems; the reputation of the organization is at stake. The impact will be based on the KPI bridged, and the KPI is assigned a weighted score based on a subjective judgment by the stakeholders. Impact of the scenario is the sum of all the KPI affected and the likelihood of the scenario occurring.I = 0.93 + 0.61 + 0.55 + 0.71 + 0.33 = 3.13Therefore, impact on the KPI from the likelihood of the cyber-attack scenario generated is 3.13, which means that the impact is low.
- Scenario 2: The attack bridged the organization’s availability, confidentiality, integrity, authenticity, maintainability, and reputation. The weight assigned to each KPI is based on the extent to which the attack impacted the organization negatively.I = 0.97 + 0.75 + 0.60 + 0.65 + 0.68 + 0.49 = 4.14
- Scenario 3: The attacker bridged availability, confidentiality, nonrepudiation, integrity, and authentication by resetting the smart meter and adjusting it for his own financial benefit.I = 1.00 + 0.45 + 0.56 + 0.63 + 0.71 = 3.35This means the attack impact is low impact to the organization, and the organization can operate without any major breakdown.
- Scenario 1:RL = 3.85 + 3.13 = 6.98 (high)
- Scenario 2:RL = 2.34 + 4.14 = 6.48 (high)
- Scenario 3:RL = 4.00 + 3.35 = 7.35 (high)
5.4.5. Activity 5: Risk Control
5.4.6. Activity 6: Risk Monitor and Residual Risk
6. Discussion
6.1. Applicability of the Approach
6.2. Comparison with Existing Study Results
6.3. Limitations of the Framework
6.4. Study Validity
7. Conclusions
Author Contributions
Conflicts of Interest
References
- Wu, W.; Kang, R.; Li, Z. Risk assessment method for cyber security of cyber physical systems. In Proceedings of the 2015 First International Conference on Reliability Systems Engineering (ICRSE), Beijing, China, 21–23 October 2015. [Google Scholar]
- Kim, K.-D.; Kumar, P. An overview and some challenges in cyber-physical systems. J. Indian Inst. Sci. 2013, 93, 341–352. [Google Scholar]
- Abouzakhar, N. Critical Infrastructure Cybersecurity: A Review of Recent Threats and Violations. In Proceedings of the European Conference on Information Warfare and Security, Jyväskylä, Finland, 11–12 July 2013. [Google Scholar]
- Marvell, S. The Real and Present Threat of a Cyber Breach Demands Real-Time Risk Management; Acuity Risk Management: London, UK, 2015. [Google Scholar]
- Adar, E.; Wuchner, A. Risk management for critical infrastructure protection (CIP) challenges, best practices & tools. In Proceedings of the First IEEE International Workshop on Critical Infrastructure Protection (IWCIP’05), Darmstadt, Germany, 3–4 November 2005. [Google Scholar]
- Marvell, S. Real-Time Cyber Security Risk Management. ITNOW 2015, 57, 26–27. [Google Scholar] [CrossRef]
- Harvey, J.; Service, T.I. Introduction to Managing Risk. Available online: http://www.cimaglobal.com/Documents/ImportedDocuments/cid_tg_intro_to_managing_rist.apr07.pdf (accessed on 29 May 2018).
- Georgieva, K.; Farooq, A.; Dumke, R.R. Analysis of the Risk Assessment Methods–A Survey. In International Workshop on Software Measurement; Springer: Berlin, Germany, 2009. [Google Scholar]
- Cherdantseva, Y.; Burnap, P.; Blyth, A.; Eden, P.; Jones, K.; Soulsby, H.; Stoddart, K. A review of cyber security risk assessment methods for SCADA systems. Comput. Secur. 2016, 56, 1–27. [Google Scholar] [CrossRef]
- Patel, S.C.; Graham, J.H.; Ralston, P.A. Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. Int. J. Inf. Manag. 2008, 28, 483–491. [Google Scholar] [CrossRef]
- Hahn, A.; Ashok, A.; Sridhar, S.; Govindarasu, M. Cyber-physical security testbeds: Architecture, application, and evaluation for smart grid. IEEE Trans. Smart Grid 2013, 4, 847–855. [Google Scholar] [CrossRef]
- Cárdenas, A.A.; Amin, S.; Lin, Z.S.; Huang, Y.L.; Huang, C.Y.; Sastry, S. Attacks against process control systems: Risk assessment, detection, and response. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, Hong Kong, China, 22–24 March 2011. [Google Scholar]
- Peng, Y.; Lu, T.; Liu, J.; Gao, Y.; Guo, X.; Xie, F. Cyber-physical system risk assessment. In Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Beijing, China, 6–18 October 2013. [Google Scholar]
- Cardenas, A.; Amin, S.; Sinopoli, B.; Giani, A.; Perrig, A.; Sastry, S. Challenges for securing cyber physical systems. In Proceedings of the Workshop on Future Directions in Cyber-Physical Systems Security, Newark, NJ, USA, 23–24 July 2009. [Google Scholar]
- Sridhar, S.; Hahn, A.; Govindarasu, M. Cyber–physical system security for the electric power grid. Proc. IEEE 2012, 100, 210–224. [Google Scholar] [CrossRef]
- Yoneda, S.; Tanimoto, S.; Konosu, T.; Sato, H.; Kanai, A. Risk Assessment in Cyber-Physical System in Office Environment. In Proceedings of the 2015 18th International Conference on Network-Based Information Systems (NBiS), Taipei, Taiwan, 2–4 September 2015. [Google Scholar]
- Ten, C.-W.; Manimaran, G.; Liu, C.-C. Cybersecurity for critical infrastructures: Attack and defense modeling. IEEE Trans. Syst. Man Cybern. Part A Syst. Hum. 2010, 40, 853–865. [Google Scholar] [CrossRef]
- Gai, K.; Qiu, M.; Ming, Z.; Zhao, H.; Qiu, L. Spoofing-jamming attack strategy using optimal power distributions in wireless smart grid networks. IEEE Trans. Smart Grid 2017, 8, 2431–2439. [Google Scholar] [CrossRef]
- Gai, K.; Qiu, M.; Zhao, H.; Tao, L.; Zong, Z. Dynamic energy-aware cloudlet-based mobile cloud computing model for green computing. J. Netw. Comput. Appl. 2016, 59, 46–54. [Google Scholar] [CrossRef]
- Gai, K.; Qiu, M. Blend arithmetic operations on tensor-based fully homomorphic encryption over real numbers. IEEE Trans. Ind. Inform. 2017. [Google Scholar] [CrossRef]
- Ray, P.D.; Harnoor, R.; Hentea, M. Smart power grid security: A unified risk management approach. In Proceedings of the 2010 IEEE International Carnahan Conference on Security Technology (ICCST), San Jose, CA, USA, 5–8 October 2010. [Google Scholar]
- Yadav, D.; Mahajan, A.R. Smart Grid Cyber Security and Risk Assessment: An Overview. Int. J. Sci. Eng. Technol. Res. 2015, 4, 3078–3085. [Google Scholar]
- Rice, E.B.; AlMajali, A. Mitigating the risk of cyber attack on smart grid systems. Procedia Comput. Sci. 2014, 28, 575–582. [Google Scholar] [CrossRef]
- ISO. Risk Management—Principles and Guidelines; ISO 31000:2009; International Organization for Standardization: Geneva, Switzerland, 2009. [Google Scholar]
- GOST-R. Risk Management. Risk Assessment Methods; ISO/IEC 31010-2011; International Organization for Standardization: Geneva, Switzerland, 2009. [Google Scholar]
- Cybersecurity, C.I. Framework for Improving Critical Infrastructure Cybersecurity. Available online: http:// www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf (accessed on 29 May 2018).
- Purdy, G. ISO 31000:2009—Setting a new standard for risk management. Risk Anal. 2010, 30, 881–886. [Google Scholar] [CrossRef] [PubMed]
- Islam, S.; Fenz, S.; Weippl, E.; Mouratidis, H. A Risk Management Framework for Cloud Migration Decision Support. J. Risk Financial Manag. 2017, 10, 10. [Google Scholar] [CrossRef]
- Islam, S.; Mouratidis, H.; Weippl, E.R. An empirical study on the implementation and evaluation of a goal-driven software development risk management model. Inf. Softw. Technol. 2014, 56, 117–133. [Google Scholar] [CrossRef]
- Berg, H.-P. Risk management: Procedures, methods and experiences. Risk Manag. 2010, 1, 79–95. [Google Scholar]
- CISO. Information Risk Assessment Handbook. Available online: http://www.nationalarchives.gov.uk/documents/information-management/risk-assessment-handbook.pdf (accessed on 29 May 2018).
- AIRMIC; ALARM; IRM. A Structured Approach to Enterprise Risk Management (ERM) and the Requirements of ISO 31000; The Public Risk Management Association: London, UK, 2010. [Google Scholar]
- NERC, CIP. Standards as Approved by the NERC Board of Trustees May 2006; North American Electric Reliability Corporation: Atlanta, GA, USA, 2006. [Google Scholar]
- Bialas, A. Risk management in critical infrastructure—Foundation for its sustainable work. Sustainability 2016, 8, 240. [Google Scholar] [CrossRef]
- Rahman, A.A.L.A.; Islam, S.; Kalloniatis, C.; Gritzalis, S. A Risk Management Approach for a Sustainable Cloud Migration. J. Risk Financial Manag. 2017, 10, 20. [Google Scholar] [CrossRef]
- Ani, U.P.D.; He, H.; Tiwari, A. Review of cybersecurity issues in industrial critical infrastructure: Manufacturing in perspective. J. Cyber Secur. Technol. 2017, 1, 32–74. [Google Scholar] [CrossRef]
- Ezell, B.C. Infrastructure Vulnerability Assessment Model (I-VAM). Risk Anal. 2007, 27, 571–583. [Google Scholar] [CrossRef] [PubMed]
- Parnell, G.S.; Conley, H.W.; Jackson, J.A.; Lehmkuhl, L.J.; Andrew, J.M. Foundations 2025: A value model for evaluating future air and space forces. Manag. Sci. 1998, 44, 1336–1350. [Google Scholar] [CrossRef]
- Blank, R.; Gallagher, P. NIST Special Publication 800-30 Revision 1 Guide for Conducting Risk Assessments; Technical Report; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2012. [Google Scholar]
- Baldoni, R. Critical Infrastructure Protection: Threats, Attacks, and Counter-Measures. Technical Report. Available online: http://www.dis.uniroma1.it/~tenace/download/deliverable/Deliverable4a.pdf (accessed on 29 May 2018).
- Utne, I.B.; Hokstad, P.; Kjølle, G.; Vatn, J.; Tøndel, I.; Bertelsen, D.; Fridheim, H.; Røstum, J. Risk and vulnerability analysis of critical infrastructures-The DECRIS approach. In Proceedings of the SAMRISK Conference, Oslo, Norway, 6–7 March 2008. [Google Scholar]
Category | Range |
---|---|
Extreme | 0.81–1.00 |
High | 0.61–0.80 |
Medium | 0.41–0.60 |
Low | 0.21–0.40 |
Very Low | 0.0–0.20 |
Score (VR) | Criteria | Description |
---|---|---|
VR.5 | Very high | One or more major weaknesses have been identified that make the asset extremely susceptible to an attack. The organization has no capability of resisting the occurrence of a threat. |
VR.4 | High | One or more major weaknesses have been identified that make the asset highly susceptible to an attack. The organization has the low capability of resisting the occurrence of a threat. |
VR.3 | Medium | A weakness has been identified that makes the asset moderately susceptible to an attack. The organization has the reasonable capability of resisting the occurrence of a threat. |
VR.2 | Low | A minor weakness has been identified that slightly increases the susceptibility of the asset to an attack. The organization has a good capability of resisting the occurrence of a threat. |
VR.1 | Very low | No weaknesses exist. The organization has an excellent capability of resisting the occurrence of a threat. |
Levels | L(S) | Ri |
---|---|---|
Almost certain | 0.60–1.00 | 1.00–1.99 |
Likely | 0.59–0.30 | 2.00–3.99 |
Unlikely | 0.29–0.01 | 4.00–5.00 |
Risk Level | Score | Description |
---|---|---|
Extreme | 10.0–8.00 | The risk level is extremely critical and requires the implementation of the control measures to mitigate risk almost immediately. The risk level is extremely critical when both the likelihood and the impact of the risk event is extreme. Could result in serious damage that could obstruct the operations of the organization. |
High | 7.99–6.00 | The risk level is highly critical and requires the implementation of the control measures for mitigating risk that has to be immediately within a short time frame. The risk impact is highly critical when both the likelihood and impact of the risk event are extreme and/or high. Expected to have a serious impact on the organization’s reputation. |
Medium | 5.99–4.00 | The risk level implies that the risk has an adversarial effect on the organization and effective actions need to be applied to the contingency plan of the organization and within a specific period of time. It is likely to result in a short-term disruption of the organization’s services. |
Low | 3.99–2.00 | The risk level from the risk event requires the organization to take effective actions and may require the need for a new contingency plan as well as corrective measures. |
Very low | 1.99–1.00 | This risk level indicates that a corrective measure needs to be implemented and a contingency plan needs to be developed. |
Sub-System | Component | Impact | Weight | Equation (1) | Criticality |
---|---|---|---|---|---|
SCADA application software | MS Office Excel Human–machine interface | 9 | 0.81 | (9 × 0.81) = 7.29 | Reasonably critical |
Operating systems | Windows 7 | 9 | 0.97 | (9 × 0.97) = 8.73 | Extremely critical |
Field devices | Programmable logic controller (PLC) Sensors Actuators Remote terminal units (RTU) | 7 | 0.69 | (7 × 0.69) = 4.83 | Reasonably critical |
Smart devices | Smart meter | 8.7 | 0.99 | (8.7 × 0.99) = 8.81 | Reasonably critical |
SCADA operators and users | Human resource manager IT personnel Senior engineer Security advisers Maintenance crew Developers | 4 | 1.00 | (4 × 1.00) = 4.00 | Reasonably critical |
Customers Government | 5 | 0.82 | (5 × 0.82) = 4.10 | Reasonably critical | |
Communication and Network infrastructure | Telephones Radio Cables Satellites Power lines | 8.5 | 0.75 | (8.5 × 0.95) = 8.08 | Extremely critical |
Host computers | Master terminal unit (MTU) Servers | 8.0 | 0.89 | (8.0 × 0.89) = 7.12 | Extremely critical |
Hardware’s | Supervisory computers | 7 | 0.69 | (7 × 0.69) = 4.85 | Reasonably critical |
Assets Affected | Potential Vulnerability | Vulnerability Ranking (VR) | Threats |
---|---|---|---|
1. SCADA operators and users | V1.1 Absence of IT personnel | VR3 | Breach of availability |
V1.2 Insufficient security training | VR3 | Error in use | |
V1.3 Lack of monitoring mechanisms | VR4 | Illegal processing of data | |
V1.4 Lack of operator awareness | VR3 | Asset compromise | |
V1.4 Absence of maintenance crew | VR3 | Breach of availability | |
2. Communication and networks | V2.1 unprotected communication lines | VR5 | Eavesdropping |
V2.2 lack of authorization and authentication | VR5 | Authorization violation | |
V2.3 failure to segment network | VR4 | Network compromise | |
V2.4 Lack barrier and control mechanism | VR4 | Bypassing controls | |
3. SCADA system | V3.1 No logouts when leaving the workstation | VR3 | Abuse of right |
V3.2 Metering challenges | VR3 | Cheating meter reading | |
V3.3 Poorly designed API, website or mobile app | VR3 | Compromise | |
V3.3. Lack of documentation | VR3 | Error in use | |
V3.4 widely distributed software | VR2 | Corruption of data | |
V3.5 weak firewall | VR3 | Access control/forging or right | |
V3.6 weak user password | VR3 | Access control | |
V3.6 Denial of service | VR4 | Authorization violation | |
4. Hardware | V4.1 Unprotected storage | VR2 | Theft of media or document |
V4.2 No spare management | VR3 | Breach of availability | |
V4.3 Equipment failure | VR4 | Breach of availability | |
5. Database | V5.1 Data leakage | VR3 | Abuse of right |
6. physical | V6.1 Unstable power grid | VR5 | Loss of power supply |
7. Organization | V7.1 Lack of disaster recovery plan | VR5 | Equipment failure |
V7.2 lack of proper allocation of information security responsibilities | VR2 | Denial of actions | |
V7.3 Lack of change control procedure | VR3 | Breach of information system maintainability | |
V7.4 Inadequate service maintenance response | VR2 | Breach of information system maintainability |
Asset Name | Vulnerability Type | Vulnerability Rating Score (VR) | Equation (3) | Vulnerability Impact (VI) |
---|---|---|---|---|
Hardware | V4.1, V4.2 | 3, 4 | 7/2 = 3.50 | Low |
SCADA system | V3.1, V3.3, V3.5 | 3, 2, 4 | 9/3 = 3.00 | Low |
Communication and networks | V2.3 | 5 | 5/1 = 5.00 | Medium |
People | V1.2, V1.3 | 3, 4 | 7/2 = 3.50 | Low |
Scenario | Controls |
---|---|
Scenario 1 | C1.1 User training is required C1.2 Strong and secure firewall configuration C1.3 Advanced control access for data provided to ensure limited access to assets C1.4 Strong combination of password and username C1.5 Regular vulnerability assessments should be carried out C1.6 Encryption of data at all times and restricted access. |
Scenario 2 | C2.1 Notification of events relating to occurrences is sent to customers when a power outage occurs or likely to occur C2.2 IT personnel security awareness programs should be I place every 6 months or yearly C2.3 Electricity suppliers should not go out of business C2.4 Necessary testing to confirm that the service, control process, alarm handling are functioning and protected from risk. |
Scenario 3 | C3.1 Violation will lead to a legal penalty C3.2 Monitoring users pattern and history C3.3 Reset the default password by the provider C3.4 Monitoring systems C3.5 Procedure to reset passwords for the smart meter after every 6 months. C3.6 Sign agreement with the customers C3.7 Accurate customer usage estimation C3.8 Tools to monitor usage of electricity accurately. |
Risk Name | Attack Scenario | Affected Asset | Likelihood |
---|---|---|---|
Unavailability of the power supply | Scenario 1 | Communication systems | Likely |
Loss of power supply | Scenario 2 | Power lines | Likely |
Loss of revenue to the grid | Scenario 3 | Smart meter | Almost certain |
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kure, H.I.; Islam, S.; Razzaque, M.A. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Appl. Sci. 2018, 8, 898. https://doi.org/10.3390/app8060898
Kure HI, Islam S, Razzaque MA. An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Applied Sciences. 2018; 8(6):898. https://doi.org/10.3390/app8060898
Chicago/Turabian StyleKure, Halima Ibrahim, Shareeful Islam, and Mohammad Abdur Razzaque. 2018. "An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System" Applied Sciences 8, no. 6: 898. https://doi.org/10.3390/app8060898
APA StyleKure, H. I., Islam, S., & Razzaque, M. A. (2018). An Integrated Cyber Security Risk Management Approach for a Cyber-Physical System. Applied Sciences, 8(6), 898. https://doi.org/10.3390/app8060898