Cybersecurity of Industrial Systems—A 2023 Report
Abstract
:1. Introduction
2. Materials & Methods
2.1. Definition of Cybersecurity
- Access control: access control to data and systems is a critical component of cybersecurity. This means that only authorized individuals or systems have access to protected resources. This can be achieved through the use of strong passwords, two-factor authentication, digital certificates, and more.
- Encryption: data encryption is important when storing, processing, and transmitting data. Encryption involves transforming data in a way that is readable only to authorized users. Examples include disk encryption and communication encryption using HTTPS or VPN protocols.
- Monitoring and threat detection: Monitoring and threat detection systems (such as antivirus programs and intrusion detection systems) are essential for identifying potential attacks on data and systems. They enable real-time responses to threats.
- Risk management: risk management involves the identification, assessment, and management of potential threats and taking actions to reduce risk. This is a process that is an integral part of cybersecurity strategy.
- Physical security: protecting digital data often requires physical security measures, such as access control to server rooms, CCTV monitoring systems, or protection against hardware theft.
- Employee training and awareness: often, the biggest threat to data security comes from people. Therefore, it is important to train employees in cybersecurity and raise their awareness of potential threats, such as phishing or social engineering.
2.2. Cybersecurity Chain
2.3. Network Security
2.4. Application Security
2.5. Information Security
2.6. Operational Security
2.7. Disaster Security
2.8. End-User Security
3. AI in Cybersecurity
3.1. Advanced Threat Detection
3.2. Predictive Analysis and Risk Assessment
3.3. Real-Time Analysis and Response
3.4. Behavioral Analytics and User Authentication
3.5. Automatic Response to Suddenly Incidents
4. Cybersecurity in Industry 4.0
4.1. A Main Component of Industry 4.0
4.2. The Role of Cybersecurity in Industry 4.0
- Increased attack area: the wide range of connected devices and sensors expands the attack area for cyber adversaries, providing more entry points for unauthorized access.
- Data integrity: according to the MHRA, this is a process that is responsible for the completeness, correctness, and reliability of generated data throughout their entire data life cycle (DLC). The DLC begins with the initial generation and recording of data, through their processing, use, storage, archiving, and destruction. So-called data integrity also ensures that data are not intentionally or accidentally modified, falsified, distorted, deleted, or altered in an unauthorized manner. This applies to both data saved in electronic format as well as data in paper form.
- Legacy system risks: many companies’ facilities still operate with legacy systems that may lack modern security features. Integrating these systems into Industry 4.0 requires accurate consideration of cybersecurity.
- Supply in communication chain: interconnected supply chains in smart manufacturing introduce new vulnerabilities. Cybersecurity must extend beyond individual factories to encompass the entire supply network.
5. Results—Cybersecurity Statistics by Industry
- Phishing: involves sending a fraudulent message in an attempt to make the recipient provide sensitive information, such as password credentials.
- Malware: involves using viruses, spyware, or other malicious software to steal information.
- Ransomware: where data are stolen and only released upon payment of a ransom. However, these data typically become available on the dark web regardless of payment.
- DoS (denial of service)/DDoS (distributed denial of service) attacks deny access to systems, making businesses inoperable.
- Healthcare.
- Financial services.
- Retail.
- Education.
- Energy and utilities.
- NEAR: near cyberattacks are localized to a specific geographic area or region. These attacks typically target organizations, institutions, or individuals within close proximity to the attacker’s location. Examples of near cyberattacks include those targeting local businesses, government agencies, or educational institutions within a city or town.
- GLOBAL: global cyberattacks have a widespread impact and can affect organizations, businesses, or individuals worldwide. These attacks often exploit vulnerabilities in global networks or systems, such as the internet, cloud infrastructure, or international financial networks. Global cyber threats, such as large-scale malware outbreaks or ransomware attacks, can disrupt global commerce, compromise sensitive information, and affect individuals across different continents.
- FAR: far cyberattacks target regions or countries that are geographically distant from the attacker’s location. These attacks may be motivated by geopolitical factors, economic interests, or ideological agendas. Far cyberattacks can have significant implications for international relations, diplomacy, and security, as they may involve state-sponsored actors or cybercriminal groups operating across borders.
- MID: mid-range cyberattacks have a moderate geographic spread, impacting multiple organizations or entities within a specific region or group of countries. These attacks may target industries or sectors with interconnected supply chains or shared infrastructure, such as transportation, energy, or healthcare. Mid-range cyber threats can disrupt regional economies, critical infrastructure, and public services, requiring coordinated responses from affected entities and government agencies.
- REGIONAL: regional cyberattacks target specific geographic regions or blocs of countries with shared economic, political, or cultural ties. These attacks may exploit vulnerabilities in regional networks, infrastructure, or industries, impacting multiple countries within a defined geographic area.
- CROSS-BORDER: cross-border cyberattacks occur when threat actors operate across national borders to target organizations, institutions, or individuals in different countries. These attacks may involve coordinated efforts by cybercriminal groups, state-sponsored actors, or hacktivist organizations to exploit weaknesses in international networks or systems.
- INTERCONTINENTAL: cyberattacks have a transcontinental impact, affecting organizations, businesses, or individuals across multiple continents. These attacks often exploit vulnerabilities in global communication networks, financial systems, or critical infrastructure, requiring international cooperation and coordination to address effectively.
- TRANSACTIONAL: transnational cyberattacks transcend traditional geopolitical boundaries and may target entities across different regions, countries, or jurisdictions. These attacks may be motivated by financial gain, political objectives, or ideological beliefs, posing challenges for law enforcement, intelligence agencies, and cybersecurity professionals in tracking and mitigating threats across borders.
- REMOTE: remote cyberattacks originate from locations that are physically distant from the target organization or individual. These attacks may leverage remote access tools, malware, or phishing techniques to infiltrate networks or compromise systems without direct physical proximity to the target. Remote attacks can be challenging to detect and mitigate, as they may exploit weaknesses in network defenses or human vulnerabilities from a distance.
- DISTRIBUTED: distributed cyberattacks involve distributed or decentralized networks of compromised devices, often referred to as botnets, to launch coordinated attacks against targets. These attacks may involve thousands or even millions of infected devices located in different geographic locations, amplifying their impact and making them difficult to mitigate through traditional means.
6. How to Protect against Cybercrime
- Increased investment in protection: organizations must boost their investments in solutions and technologies that safeguard against cyberattacks. This includes the procurement and implementation of advanced threat detection and response tools, as well as continuous security system updates.
- Enhanced employee awareness: employees often serve as the first line of defense against cyberthreats. Organizations need to invest in employee education regarding cybersecurity to help them recognize and avoid potential threats, such as phishing and social engineering.
- Strict information security policy: the implementation and enforcement of a rigorous information security policy are crucial. These encompass creating strong passwords, restricting access to critical resources, monitoring user activities, and various other security practices.
- Rapid incident response: organizations must be prepared for an immediate response to cybersecurity incidents. This involves establishing action plans for security breaches and training teams responsible for incident management.
- Infrastructure updates and monitoring: regular software and firmware updates for devices, along with continuous network and system monitoring, aid in detecting and mitigating potential threats.
- Collaboration with suppliers: organizations should collaborate with software and service providers to ensure that the solutions they employ are protected against vulnerabilities and threats.
- Access controls: implementing stringent access controls for systems and data, along with the use of two-factor authentication, helps reduce the risk of unauthorized access.
- Network traffic controls: monitoring network traffic and applying traffic control policies assist in detecting anomalies and limiting access to potentially dangerous sources.
- Robust recovery procedures: developing and testing recovery plans for incidents, including creating backups and restoring systems, is vital for minimizing losses and operational disruptions.
- Risk monitoring and assessment: regularly evaluating cybersecurity risks enables organizations to adapt their security strategies to the evolving threat landscape.
7. Tuning Neural Network Parameters
- Training data collection:
- -
- Specify the purpose of the classification, i.e., what we would like to predict using the SVM model.
- -
- Specify the classes we want to distinguish.
- -
- Identify the categories (classes) we want to predict.
- Data preprocessing:Initially, the data undergo noise removal, normalization, and feature engineering. This procedure aims to facilitate the optimal functioning of neural networks and the SVM algorithm.Class mapping involves assigning unique numerical identifiers (class labels) to the categories or groups that our model needs to learn to recognize attacks. This process is crucial for data preparation in classification tasks where the primary goal is to assign objects to specific classes.It is best to use binary notation for this purpose, which will be further processed by neural networks. For instance, the “Positive” class can be marked as 1 and the “Negative” class as 0. We present three classes of events described as Class A: [1, 0, 0], Class B: [0, 1, 0], and Class C: [0, 0, 1].
- SVM for feature extraction:Traditionally, the support vector machine (SVM) is used as a classification algorithm, but there is an approach to using it for feature extraction:
- -
- Training an SVM model on selected data to obtain a hyperplane that separates different classes.
- -
- During the practical process, the SVM evaluates the weight vector, , and scalar shifts, B.
- Feature extraction:Each example of data, x, can be transformed into a feature vector, f, using the formula:We obtain a feature vector that can be used as a new representation of the data. The function can be understood as the function constructed by the SVM model to assign examples to classes. If is greater than zero, the point is assigned to one class, and if it is less than zero, the point is assigned to the other class. A value of indicates that the point is on the separating hyperplane. The equation of the energy function can be described as:The first part of Equation (2) refers to minimizing the length of the weight vector, , and the second part refers to minimizing the sum of classification errors. These simple steps describe how the SVM works.
- Feature extraction from the neural network layer:The next step involves the algorithm collecting and preparing training data to be used for training the model on the neural network.
- Data processing:Data processing depends on factors such as the data structure, neurons, activation function, and objective function used. The choice of solution is experimental.If necessary, the input data can be standardized or normalized to facilitate the operation of the algorithm and the interpretation of the obtained results as output.When deciding to use the SVM algorithm for feature extraction, the classification results from the SVM are prepared as input to the neural network. These results can constitute a vector of features for subsequent neural network layers.We create a neural network with inputs obtained from the SVM. The neural network should be designed to adapt to the characteristics of the data and effectively predict the final result.
- Classification:The resulting set of features is used for classification, where both the SVM and the neural network influence the final decision.It is clear that both the SVM and neural networks are used in different contexts and have different advantages and limitations. The decision to use one or both depends on the specific situation, input data, and purpose of the analysis. In practice, we usually experiment with different models to find the most effective solution for a given problem.
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- International Society of Automation. ISA/IEC 62443 Series of Standards. 2023. Available online: https://www.isa.org/standards-and-publications/isa-standards/isa-iec-62443-series-of-standards (accessed on 8 November 2023).
- Avdibasic, E.; Toksanovna, A.S.; Durakovic, B. Cybersecurity Challenges in Industry 4.0: A State of the Art Review. Def. Secur. Stud. 2022, 3, 32–49. [Google Scholar] [CrossRef]
- What Is Cybersecurity? 2023. Available online: https://www.cisa.gov/news-events/news/what-cybersecurity (accessed on 8 November 2023).
- Berindei, A.M.; Ilie, C.; Florentina, B. The Cyber Security Paradigm in Industry 4.0. Int. J. Mechatron. Appl. Mech. 2023, 226–229. [Google Scholar] [CrossRef]
- ENISA Threat Landscape 2022. 2023. Available online: https://www.enisa.europa.eu/publications/enisa-threat-landscape-2022 (accessed on 8 November 2023).
- Kumar, G.; Singh, O.P.; Saini, H. (Eds.) Cybersecurity Ambient Technologies, IoT, and Industry 4.0 Implications; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
- Morgan, D.; Gavrilescu, A.; Burstein, J.L.; Shelest, A.; LeBlanc, D. Method of Assisting an Application to Traverse a Firewall. U.S. Patent No. 7559082, 7 July 2009. [Google Scholar]
- What Is Operational Security & Why Is It Important? 2023. Available online: https://reciprocity.com/blog/what-is-operational-security-why-is-it-important/ (accessed on 8 November 2023).
- TechTarget. AI (Artificial Intelligence). 2023. Available online: https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence (accessed on 19 November 2023).
- Management, M.S.S. Machine Learning Explained. 2023. Available online: https://mitsloan.mit.edu/ideas-made-to-matter/machine-learning-explained (accessed on 19 November 2023).
- Cunningham, D.C.; Touhill, G.J. Cyber Warfare-Truth, Tactics, and Strategies; Packt Publishing: Birmingham, UK, 2020. [Google Scholar]
- Aiken, M. The Cyber Effect; Spiegel & Grau: New York, NY, USA, 2016. [Google Scholar]
- Stanham, L. What Is AI-Powered Behavioral Analysis in Cybersecurity. 2023. Available online: https://www.crowdstrike.com/cybersecurity-101/secops/ai-powered-behavioral-analysis/ (accessed on 19 November 2023).
- Schneier, B. Schneier on Security, 1st ed.; John Wiley & Sons: Hoboken, NJ, USA, 2008. [Google Scholar]
- IBM. IBM Industry 4.0. Available online: https://www.ibm.com/topics/industry-4-0 (accessed on 19 November 2023).
- GMP Data Integrity Definitions and Guidance for Industry. 2018. Available online: https://assets.publishing.service.gov.uk/media/5ac4a6cc40f0b60a4be86d80/Data_integrity_definitions_and_guidance_v2_Withdrawn.pdf (accessed on 18 March 2024).
- Guidance on Good Data and Record Management Practices. 2016. Available online: https://www.gmp-compliance.org/gmp-news/final-who-guidance-document-on-good-data-and-record-management-practices (accessed on 18 March 2024).
- Data Integrity and Compliance with CGMP—Questions and Answers, Guidance for Industry. 2018. Available online: https://www.fda.gov/regulatory-information/search-fda-guidance-documents/data-integrity-and-compliance-drug-cgmp-questions-and-answers (accessed on 18 March 2024).
- Good Practices for Data Management and Integrity in Regulated GMP/GDP Environments. 2021. Available online: https://www.gmp-compliance.org/guidelines/gmp-guideline/pic-s-good-practices-for-data-management-and-integrity-in-regulated-gmp-gdp-environments-pi-041-1 (accessed on 18 March 2024).
- Guidance on Good Manufacturing Practice and Good Distribution Practice: Questions and Answers. 2016. Available online: https://www.ema.europa.eu/en/human-regulatory/research-development/compliance/good-manufacturing-practice/guidance-good-manufacturing-practice-good-distribution-practice-questions-answers (accessed on 20 November 2023).
- Kamel, S.O.M.; Hegazi, N.H. A Proposed Model of IoT Security Management System Based on A study of Internet of Things (IoT) Security. Int. J. Sci. Eng. Res. 2018, 9, 1227–1244. [Google Scholar]
- Tech Monitor. Port of London Authority Cyberattack. 2023. Available online: https://techmonitor.ai/technology/cybersecurity/port-of-london-authority-cyberattack (accessed on 8 November 2023).
- Significant Cyber Incidents. 2023. Available online: https://www.csis.org/programs/strategic-technologies-program/significant-cyber-incidents (accessed on 8 November 2023).
- DDoS Attacks on Andorra’s Internet Linked to Squid Game, Minecraft Tournament. Available online: https://therecord.media/ddos-attacks-on-andorras-internet-linked-to-squid-game-minecraft-tournament/ (accessed on 8 November 2023).
- MediaMarkt Getroffen Door Ransomware-Aanval, Cybercriminelen Dreigen Met Publicatie Gestolen Data. 2023. Available online: https://www.rtlnieuws.nl/tech/artikel/5289859/mediamarkt-ransomware-hive-cybercriminelen-onderhandelingen-helpdesk (accessed on 8 November 2023).
- Global IT Services Provider Inetum Hit by Ransomware Attack. 2023. Available online: https://www.bleepingcomputer.com/news/security/global-it-services-provider-inetum-hit-by-ransomware-attack/ (accessed on 8 November 2023).
- Virus Attacks: What You Need to Know. 2023. Available online: https://www.nordicchoicehotels.com/blog/information/virus-attacks (accessed on 8 November 2023).
- French Ministry of Justice Targeted in Ransomware Attack. 2023. Available online: https://www.securityweek.com/french-ministry-justice-targeted-ransomware-attack (accessed on 8 November 2023).
- BlackCat-Alphv Claims Swissport Ransomware Attack, Leaks Data. 2023. Available online: https://www.bleepingcomputer.com/news/security/blackcat-alphv-claims-swissport-ransomware-attack-leaks-data/ (accessed on 8 November 2023).
- Jenkinson, A. Ransomware and Cybercrime, 1st ed.; CRC Press: Boca Raton, FL, USA, 2022. [Google Scholar] [CrossRef]
- Rohit Shewale. Cybersecurity Statistics. Available online: https://www.demandsage.com/cybersecurity-statistics/ (accessed on 17 March 2024).
- Zhang, L.; Wang, H.; Xue, H.; Zhang, H.; Liu, Q.; Niyato, D.; Han, Z. Digital Twin-Assisted Edge Computation Offloading in Industrial Internet of Things With NOMA. IEEE Trans. Veh. Technol. 2023, 72, 11935–11950. [Google Scholar] [CrossRef]
- Zhang, L.; Wu, S.; Xu, H.; Liu, Q.; Hong, C.S.; Han, Z. Optimizing Tradeoff Between Learning Speed and Cost for Federated Learning-Enabled Industrial IoT. IEEE Internet Things J. 2023, 1. [Google Scholar] [CrossRef]
Time | Geographical Spread | Description |
---|---|---|
May 2022 | NEAR | The Port of London Authority was hit by a DDoS that took its website offline for 24 h. The attack was launched by Pro-Iran Group Altahrea [22]. |
May 2022 | NEAR | Italian websites of the Senate, the Ministry of Defence, and the National Health Institute were targeted by a DDoS attack launched by Russian hackers with the intent of targeting NATO countries [23]. |
March 2022 | FAR | The Israeli ISP Cellcom was the target of a large-scale DDoS attack, which resulted in government resources, that is, ministry websites, being offline for a while. |
January 2022 | MID | Andorra Telecom was hit by a DDoS attack that temporally stopped communications in the country [24]. According to the media, the targets were the participants in the Twitch Rivals Squidcraft Games, a Minecraft tournament based on Squid Game. There are suspicions that the target was not the Andorra government and its citizens (they were just collateral damage) but rather some Andorra streamers who were unable to continue the game to win the top prize of $100,000. |
Time | Geographical Spread | Description |
---|---|---|
November 2021 | NEAR | Media Markt, a German electronic retailer, was hit by Hive ransomware, impacting 49 stores in the Netherlands. The infection caused impacts on retrieving orders and returns in the store. Interestingly, a Dutch reporter received insight into the communication between Hive and the company, revealing they had not paid the ransom [25]. |
December 2021 | NEAR | French IT services company Inetum Group [26] suffered a ransomware attack. Although unconfirmed, the attack is attributed to ALPHV. Official statements mention only a limited impact on the business and its customers. This attack follows the BGH trend, with large corporations being targeted, as impact could cause a tickle-down effect on its customers. |
December 2021 | NEAR | Nordic Choice Hotels was impacted by Conti ransomware. The incident impacted the hotel’s guest reservation and room key card systems [27]. Guests reported their key cards to be out of service. |
January 2022 | NEAR | Ministry of Justice in France: threat actors who are using ransomware LockBit 2.0 have posted a message on their Tor-based leak website claiming to have stolen files from the Ministry of Justice’s systems [28]. February 2022 MID Swissport, an airport management services company: the BlackCat ransomware group, aka ALPHV, claimed responsibility for the recent cyberattack on Swissport that caused flight delays and service disruptions [29]. |
February 2022 | GLOBAL | Nvidia Corp (Lapsus$ ransomware gang): ’Lapsus$’ took responsibility for the breach on its Telegram channel and claims to have stolen 1 terabyte of information, including ’highly confidential/secret data’ and proprietary source code [30]. |
March 2022 | FAR | Toyota Motor suspended operations in 28 production lines across 14 plants in Japan for at least a day after a key supply chain player was hit by a suspected cyberattack. The incident affected Toyota’s plastic parts and electronic components supplier Kojima Industries on February 24. The firm said it discovered a malware infection and a ’threatening message’ on rebooting after a file error on its server. The nature of events suggests that Kojima Industries was likely a victim of a ransomware attack. |
Industry | Share of Cyberattacks Recorded in the Industry |
---|---|
Manufacturing | 24% |
Finance and insurance | 18.9% |
Professional, business, and consumer services | 14.6% |
Energy | 10.7% |
Retail and wholesale | 8.7% |
Education | 7.3% |
Healthcare | 5.8% |
Government | 4.8% |
Transportation | 3.9% |
Media and telecom | 0.5% |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pochmara, J.; Świetlicka, A. Cybersecurity of Industrial Systems—A 2023 Report. Electronics 2024, 13, 1191. https://doi.org/10.3390/electronics13071191
Pochmara J, Świetlicka A. Cybersecurity of Industrial Systems—A 2023 Report. Electronics. 2024; 13(7):1191. https://doi.org/10.3390/electronics13071191
Chicago/Turabian StylePochmara, Janusz, and Aleksandra Świetlicka. 2024. "Cybersecurity of Industrial Systems—A 2023 Report" Electronics 13, no. 7: 1191. https://doi.org/10.3390/electronics13071191
APA StylePochmara, J., & Świetlicka, A. (2024). Cybersecurity of Industrial Systems—A 2023 Report. Electronics, 13(7), 1191. https://doi.org/10.3390/electronics13071191