LAUSR.org creates dashboard-style pages of related content for over 1.5 million academic articles. Sign Up to like articles & get recommendations!

The method of assessment of impacts of a cyberattacks on the industrial process

Photo by thoughtcatalog from unsplash

The rapid development of modern information management technology leads to the emergence of new aspect of their security. In particular, special importance has acquired the co-called problems of industrial cyber-security,… Click to show full abstract

The rapid development of modern information management technology leads to the emergence of new aspect of their security. In particular, special importance has acquired the co-called problems of industrial cyber-security, gradually allocated in independent field of scientific and technical research. In recent years, the number of attacks on industrial objects has increased significantly. This is according by ICS-CERT reports for 2014-2015. Several incidents that have received wide press coverage are related with cybersecurity issues. For example, the STUXNET virus, which affects Siemens industrial systems. STUXNET caused serious damage to Iran’s nuclear program by exploiting vulnerabilities of the operating system and the so-called “human factor”. There are a number of modified viruses capable of carrying out successful attacks on various industrial networks based on STUXNET architecture. Siemens is one of the key industrial equipment manufacturers in the world, so STUXNET is widespread and was even discovered at Russian NPP. Thus the security of the automated control systems, process control is critical now and its importance can not be underestimated. One of the most devastating attacks on the possible damage is the diversion of the production process. Diversion of the process affects all levels of the process control system. This article proposes assessment of consequences of performing each of the described attack’s steps, determines the information possessed by the attacker after each phase of attack.

Keywords: method assessment; impacts cyberattacks; process; assessment impacts; industrial process; cyberattacks industrial

Journal Title: Bit Numerical Mathematics
Year Published: 2017

Link to full text (if available)


Share on Social Media:                               Sign Up to like & get
recommendations!

Related content

More Information              News              Social Media              Video              Recommended



                Click one of the above tabs to view related content.