Improving cyber security in industrial control system environment.

dc.contributor.advisorHe, Hongmei
dc.contributor.advisorTiwari, Ashutosh
dc.contributor.authorAni, Uchenna Daniel
dc.date.accessioned2023-04-13T12:09:06Z
dc.date.available2023-04-13T12:09:06Z
dc.date.issued2018-02
dc.description.abstractIntegrating industrial control system (ICS) with information technology (IT) and internet technologies has made industrial control system environments (ICSEs) more vulnerable to cyber-attacks. Increased connectivity has brought about increased security threats, vulnerabilities, and risks in both technology and people (human) constituents of the ICSE. Regardless of existing security solutions which are chiefly tailored towards technical dimensions, cyber-attacks on ICSEs continue to increase with a proportionate level of consequences and impacts. These consequences include system failures or breakdowns, likewise affecting the operations of dependent systems. Impacts often include; marring physical safety, triggering loss of lives, causing huge economic damages, and thwarting the vital missions of productions and businesses. This thesis addresses uncharted solution paths to the above challenges by investigating both technical and human-factor security evaluations to improve cyber security in the ICSE. An ICS testbed, scenario-based, and expert opinion approaches are used to demonstrate and validate cyber-attack feasibility scenarios. To improve security of ICSs, the research provides: (i) an adaptive operational security metrics generation (OSMG) framework for generating suitable security metrics for security evaluations in ICSEs, and a list of good security metrics methodology characteristics (scope-definitive, objective-oriented, reliable, simple, adaptable, and repeatable), (ii) a technical multi-attribute vulnerability (and impact) assessment (MAVCA) methodology that considers and combines dynamic metrics (temporal and environmental) attributes of vulnerabilities with the functional dependency relationship attributes of the vulnerability host components, to achieve a better representation of exploitation impacts on ICSE networks, (iii) a quantitative human-factor security (capability and vulnerability) evaluation model based on human-agent security knowledge and skills, used to identify the most vulnerable human elements, identify the least security aspects of the general workforce, and prioritise security enhancement efforts, and (iv) security risk reduction through critical impact point assessment (S2R-CIPA) process model that demonstrates the combination of technical and human-factor security evaluations to mitigate risks and achieve ICSE-wide security enhancements. The approaches or models of cyber-attack feasibility testing, adaptive security metrication, multi-attribute impact analysis, and workforce security capability evaluations can support security auditors, analysts, managers, and system owners of ICSs to create security strategies and improve cyber incidence response, and thus effectively reduce security risk.en_UK
dc.description.coursenamePhD in Manufacturingen_UK
dc.identifier.urihttps://dspace.lib.cranfield.ac.uk/handle/1826/19453
dc.language.isoenen_UK
dc.rights© Cranfield University, 2015. All rights reserved. No part of this publication may be reproduced without the written permission of the copyright holder.
dc.subjectIndustrial cyber securityen_UK
dc.subjectcyber-physical system securityen_UK
dc.subjectcyber security evaluationen_UK
dc.subjectsecurity impact analysisen_UK
dc.subjectoperational security metricsen_UK
dc.subjecthuman-factor securityen_UK
dc.subjectfunctional dependency analysisen_UK
dc.subjectsecurity criticality analysisen_UK
dc.subjectsecurity risk assessmenten_UK
dc.titleImproving cyber security in industrial control system environment.en_UK
dc.typeThesisen_UK

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ani_U_2018.pdf
Size:
7.29 MB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.63 KB
Format:
Item-specific license agreed upon to submission
Description: