Loading…
Exploring the information security culture within industrial control systems organisations: Expert reviews
The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attac...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 1 |
container_start_page | |
container_title | |
container_volume | 2617 |
creator | Ismail, Suhaila Ismail, Mohd Nazri Ahmad, Arniyati Khairuddin, Mohammad Adib |
description | The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations. |
doi_str_mv | 10.1063/5.0120877 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2738679524</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2738679524</sourcerecordid><originalsourceid>FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKsL_0HAnTA1j8kk405KfUDBjYK7kEkybcp0MiaZ1v57pw9w5-ouznfOuRwAbjGaYFTQBzZBmCDB-RkYYcZwxgtcnIMRQmWekZx-XYKrGFcIkZJzMQKr2U_X-ODaBUxLC11b-7BWyfkWRqv74NIO6r5JfbBw69LStQNj-piCUw3Uvk3BNzDuYrLrCH1YqNbFgz8-wiHbhgSD3Ti7jdfgolZNtDenOwafz7OP6Ws2f395mz7Ns44gyjPLhDVWa64xZVUuDKqKklPFcU4YMYXNmcqFKJmxphrEGmmmiCoFrmpb45yOwd0xtwv-u7cxyZXvQztUSsKpKHjJyJ66P1JRu3R4WHbBrVXYSYzkfkvJ5GnL_-CND3-g7ExNfwEXq3hi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2738679524</pqid></control><display><type>conference_proceeding</type><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><source>American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)</source><creator>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib</creator><contributor>Ali, Sharifah Aishah Syed ; Shukran, Mohd ‘Afizi Mohd ; Khairuddin, Mohammad Adib ; Sajak, Aznida Abu Bakar ; Isa, Mohd Rizal Mohd ; Appan, Nanthini Sridewi</contributor><creatorcontrib>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib ; Ali, Sharifah Aishah Syed ; Shukran, Mohd ‘Afizi Mohd ; Khairuddin, Mohammad Adib ; Sajak, Aznida Abu Bakar ; Isa, Mohd Rizal Mohd ; Appan, Nanthini Sridewi</creatorcontrib><description>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0120877</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Big Data ; Cloud computing ; Control systems ; Cybersecurity ; Data storage ; Industrial electronics ; New technology ; Scientific papers ; Supervisory control and data acquisition</subject><ispartof>AIP Conference Proceedings, 2022, Vol.2617 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids></links><search><contributor>Ali, Sharifah Aishah Syed</contributor><contributor>Shukran, Mohd ‘Afizi Mohd</contributor><contributor>Khairuddin, Mohammad Adib</contributor><contributor>Sajak, Aznida Abu Bakar</contributor><contributor>Isa, Mohd Rizal Mohd</contributor><contributor>Appan, Nanthini Sridewi</contributor><creatorcontrib>Ismail, Suhaila</creatorcontrib><creatorcontrib>Ismail, Mohd Nazri</creatorcontrib><creatorcontrib>Ahmad, Arniyati</creatorcontrib><creatorcontrib>Khairuddin, Mohammad Adib</creatorcontrib><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><title>AIP Conference Proceedings</title><description>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</description><subject>Big Data</subject><subject>Cloud computing</subject><subject>Control systems</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Industrial electronics</subject><subject>New technology</subject><subject>Scientific papers</subject><subject>Supervisory control and data acquisition</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNp9kEtLAzEUhYMoWKsL_0HAnTA1j8kk405KfUDBjYK7kEkybcp0MiaZ1v57pw9w5-ouznfOuRwAbjGaYFTQBzZBmCDB-RkYYcZwxgtcnIMRQmWekZx-XYKrGFcIkZJzMQKr2U_X-ODaBUxLC11b-7BWyfkWRqv74NIO6r5JfbBw69LStQNj-piCUw3Uvk3BNzDuYrLrCH1YqNbFgz8-wiHbhgSD3Ti7jdfgolZNtDenOwafz7OP6Ws2f395mz7Ns44gyjPLhDVWa64xZVUuDKqKklPFcU4YMYXNmcqFKJmxphrEGmmmiCoFrmpb45yOwd0xtwv-u7cxyZXvQztUSsKpKHjJyJ66P1JRu3R4WHbBrVXYSYzkfkvJ5GnL_-CND3-g7ExNfwEXq3hi</recordid><startdate>20221122</startdate><enddate>20221122</enddate><creator>Ismail, Suhaila</creator><creator>Ismail, Mohd Nazri</creator><creator>Ahmad, Arniyati</creator><creator>Khairuddin, Mohammad Adib</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221122</creationdate><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><author>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Big Data</topic><topic>Cloud computing</topic><topic>Control systems</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Industrial electronics</topic><topic>New technology</topic><topic>Scientific papers</topic><topic>Supervisory control and data acquisition</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ismail, Suhaila</creatorcontrib><creatorcontrib>Ismail, Mohd Nazri</creatorcontrib><creatorcontrib>Ahmad, Arniyati</creatorcontrib><creatorcontrib>Khairuddin, Mohammad Adib</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ismail, Suhaila</au><au>Ismail, Mohd Nazri</au><au>Ahmad, Arniyati</au><au>Khairuddin, Mohammad Adib</au><au>Ali, Sharifah Aishah Syed</au><au>Shukran, Mohd ‘Afizi Mohd</au><au>Khairuddin, Mohammad Adib</au><au>Sajak, Aznida Abu Bakar</au><au>Isa, Mohd Rizal Mohd</au><au>Appan, Nanthini Sridewi</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploring the information security culture within industrial control systems organisations: Expert reviews</atitle><btitle>AIP Conference Proceedings</btitle><date>2022-11-22</date><risdate>2022</risdate><volume>2617</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0120877</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0094-243X |
ispartof | AIP Conference Proceedings, 2022, Vol.2617 (1) |
issn | 0094-243X 1551-7616 |
language | eng |
recordid | cdi_proquest_journals_2738679524 |
source | American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list) |
subjects | Big Data Cloud computing Control systems Cybersecurity Data storage Industrial electronics New technology Scientific papers Supervisory control and data acquisition |
title | Exploring the information security culture within industrial control systems organisations: Expert reviews |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T13%3A06%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploring%20the%20information%20security%20culture%20within%20industrial%20control%20systems%20organisations:%20Expert%20reviews&rft.btitle=AIP%20Conference%20Proceedings&rft.au=Ismail,%20Suhaila&rft.date=2022-11-22&rft.volume=2617&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0120877&rft_dat=%3Cproquest_scita%3E2738679524%3C/proquest_scita%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2738679524&rft_id=info:pmid/&rfr_iscdi=true |