Loading…

Exploring the information security culture within industrial control systems organisations: Expert reviews

The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attac...

Full description

Saved in:
Bibliographic Details
Main Authors: Ismail, Suhaila, Ismail, Mohd Nazri, Ahmad, Arniyati, Khairuddin, Mohammad Adib
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page
container_issue 1
container_start_page
container_title
container_volume 2617
creator Ismail, Suhaila
Ismail, Mohd Nazri
Ahmad, Arniyati
Khairuddin, Mohammad Adib
description The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.
doi_str_mv 10.1063/5.0120877
format conference_proceeding
fullrecord <record><control><sourceid>proquest_scita</sourceid><recordid>TN_cdi_proquest_journals_2738679524</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2738679524</sourcerecordid><originalsourceid>FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143</originalsourceid><addsrcrecordid>eNp9kEtLAzEUhYMoWKsL_0HAnTA1j8kk405KfUDBjYK7kEkybcp0MiaZ1v57pw9w5-ouznfOuRwAbjGaYFTQBzZBmCDB-RkYYcZwxgtcnIMRQmWekZx-XYKrGFcIkZJzMQKr2U_X-ODaBUxLC11b-7BWyfkWRqv74NIO6r5JfbBw69LStQNj-piCUw3Uvk3BNzDuYrLrCH1YqNbFgz8-wiHbhgSD3Ti7jdfgolZNtDenOwafz7OP6Ws2f395mz7Ns44gyjPLhDVWa64xZVUuDKqKklPFcU4YMYXNmcqFKJmxphrEGmmmiCoFrmpb45yOwd0xtwv-u7cxyZXvQztUSsKpKHjJyJ66P1JRu3R4WHbBrVXYSYzkfkvJ5GnL_-CND3-g7ExNfwEXq3hi</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype><pqid>2738679524</pqid></control><display><type>conference_proceeding</type><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><source>American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)</source><creator>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib</creator><contributor>Ali, Sharifah Aishah Syed ; Shukran, Mohd ‘Afizi Mohd ; Khairuddin, Mohammad Adib ; Sajak, Aznida Abu Bakar ; Isa, Mohd Rizal Mohd ; Appan, Nanthini Sridewi</contributor><creatorcontrib>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib ; Ali, Sharifah Aishah Syed ; Shukran, Mohd ‘Afizi Mohd ; Khairuddin, Mohammad Adib ; Sajak, Aznida Abu Bakar ; Isa, Mohd Rizal Mohd ; Appan, Nanthini Sridewi</creatorcontrib><description>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</description><identifier>ISSN: 0094-243X</identifier><identifier>EISSN: 1551-7616</identifier><identifier>DOI: 10.1063/5.0120877</identifier><identifier>CODEN: APCPCS</identifier><language>eng</language><publisher>Melville: American Institute of Physics</publisher><subject>Big Data ; Cloud computing ; Control systems ; Cybersecurity ; Data storage ; Industrial electronics ; New technology ; Scientific papers ; Supervisory control and data acquisition</subject><ispartof>AIP Conference Proceedings, 2022, Vol.2617 (1)</ispartof><rights>Author(s)</rights><rights>2022 Author(s). Published by AIP Publishing.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>309,310,314,780,784,789,790,23930,23931,25140,27924,27925</link.rule.ids></links><search><contributor>Ali, Sharifah Aishah Syed</contributor><contributor>Shukran, Mohd ‘Afizi Mohd</contributor><contributor>Khairuddin, Mohammad Adib</contributor><contributor>Sajak, Aznida Abu Bakar</contributor><contributor>Isa, Mohd Rizal Mohd</contributor><contributor>Appan, Nanthini Sridewi</contributor><creatorcontrib>Ismail, Suhaila</creatorcontrib><creatorcontrib>Ismail, Mohd Nazri</creatorcontrib><creatorcontrib>Ahmad, Arniyati</creatorcontrib><creatorcontrib>Khairuddin, Mohammad Adib</creatorcontrib><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><title>AIP Conference Proceedings</title><description>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</description><subject>Big Data</subject><subject>Cloud computing</subject><subject>Control systems</subject><subject>Cybersecurity</subject><subject>Data storage</subject><subject>Industrial electronics</subject><subject>New technology</subject><subject>Scientific papers</subject><subject>Supervisory control and data acquisition</subject><issn>0094-243X</issn><issn>1551-7616</issn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2022</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNp9kEtLAzEUhYMoWKsL_0HAnTA1j8kk405KfUDBjYK7kEkybcp0MiaZ1v57pw9w5-ouznfOuRwAbjGaYFTQBzZBmCDB-RkYYcZwxgtcnIMRQmWekZx-XYKrGFcIkZJzMQKr2U_X-ODaBUxLC11b-7BWyfkWRqv74NIO6r5JfbBw69LStQNj-piCUw3Uvk3BNzDuYrLrCH1YqNbFgz8-wiHbhgSD3Ti7jdfgolZNtDenOwafz7OP6Ws2f395mz7Ns44gyjPLhDVWa64xZVUuDKqKklPFcU4YMYXNmcqFKJmxphrEGmmmiCoFrmpb45yOwd0xtwv-u7cxyZXvQztUSsKpKHjJyJ66P1JRu3R4WHbBrVXYSYzkfkvJ5GnL_-CND3-g7ExNfwEXq3hi</recordid><startdate>20221122</startdate><enddate>20221122</enddate><creator>Ismail, Suhaila</creator><creator>Ismail, Mohd Nazri</creator><creator>Ahmad, Arniyati</creator><creator>Khairuddin, Mohammad Adib</creator><general>American Institute of Physics</general><scope>8FD</scope><scope>H8D</scope><scope>L7M</scope></search><sort><creationdate>20221122</creationdate><title>Exploring the information security culture within industrial control systems organisations: Expert reviews</title><author>Ismail, Suhaila ; Ismail, Mohd Nazri ; Ahmad, Arniyati ; Khairuddin, Mohammad Adib</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Big Data</topic><topic>Cloud computing</topic><topic>Control systems</topic><topic>Cybersecurity</topic><topic>Data storage</topic><topic>Industrial electronics</topic><topic>New technology</topic><topic>Scientific papers</topic><topic>Supervisory control and data acquisition</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Ismail, Suhaila</creatorcontrib><creatorcontrib>Ismail, Mohd Nazri</creatorcontrib><creatorcontrib>Ahmad, Arniyati</creatorcontrib><creatorcontrib>Khairuddin, Mohammad Adib</creatorcontrib><collection>Technology Research Database</collection><collection>Aerospace Database</collection><collection>Advanced Technologies Database with Aerospace</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ismail, Suhaila</au><au>Ismail, Mohd Nazri</au><au>Ahmad, Arniyati</au><au>Khairuddin, Mohammad Adib</au><au>Ali, Sharifah Aishah Syed</au><au>Shukran, Mohd ‘Afizi Mohd</au><au>Khairuddin, Mohammad Adib</au><au>Sajak, Aznida Abu Bakar</au><au>Isa, Mohd Rizal Mohd</au><au>Appan, Nanthini Sridewi</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Exploring the information security culture within industrial control systems organisations: Expert reviews</atitle><btitle>AIP Conference Proceedings</btitle><date>2022-11-22</date><risdate>2022</risdate><volume>2617</volume><issue>1</issue><issn>0094-243X</issn><eissn>1551-7616</eissn><coden>APCPCS</coden><abstract>The security of computer-automated systems governing the Critical Infrastructures sectors: Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems represent a significant challenge in the present time. These systems have seen numerous examples of malicious attacks including Stuxnet and Night Dragon attacks. Unknown cyber-security threat vectors towards the critical industrial processes and systems seem to be unavoidable due to the new technology trends such as Mobility, BYO devices, cloud storage and big data. Recognising and rapidly responding to these attacks could be possible by strengthening the information security implementations within organisations. This research paper proposes a holistic approach to cultivate awareness within the organisations by instilling an information security culture. This includes assessing the information security compliance, awareness, measures, policies and government as adapted from the Information Security Culture Model. The information is gathered through semi-structured interviews of eight IDS and SCADA systems experts and were then analysed deductively. This paper presents the results of this research study analysis to evaluate the current information security culture within SCADA organisations.</abstract><cop>Melville</cop><pub>American Institute of Physics</pub><doi>10.1063/5.0120877</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 0094-243X
ispartof AIP Conference Proceedings, 2022, Vol.2617 (1)
issn 0094-243X
1551-7616
language eng
recordid cdi_proquest_journals_2738679524
source American Institute of Physics:Jisc Collections:Transitional Journals Agreement 2021-23 (Reading list)
subjects Big Data
Cloud computing
Control systems
Cybersecurity
Data storage
Industrial electronics
New technology
Scientific papers
Supervisory control and data acquisition
title Exploring the information security culture within industrial control systems organisations: Expert reviews
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-01T13%3A06%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_scita&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Exploring%20the%20information%20security%20culture%20within%20industrial%20control%20systems%20organisations:%20Expert%20reviews&rft.btitle=AIP%20Conference%20Proceedings&rft.au=Ismail,%20Suhaila&rft.date=2022-11-22&rft.volume=2617&rft.issue=1&rft.issn=0094-243X&rft.eissn=1551-7616&rft.coden=APCPCS&rft_id=info:doi/10.1063/5.0120877&rft_dat=%3Cproquest_scita%3E2738679524%3C/proquest_scita%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-p2037-e58edecc7c135b48d0b6973a714252d6e45a48895dedbd0bf0c5a2a981bfef143%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2738679524&rft_id=info:pmid/&rfr_iscdi=true