Loading…

Treasure maps and special effects: The digital twin offering to threat actors

This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twi...

Full description

Saved in:
Bibliographic Details
Main Authors: Andrew Peck, Iain Phillips, Tim Watson
Format: Default Conference proceeding
Published: 2024
Subjects:
Online Access:https://hdl.handle.net/2134/27316317.v1
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1818176490622156800
author Andrew Peck
Iain Phillips
Tim Watson
author_facet Andrew Peck
Iain Phillips
Tim Watson
author_sort Andrew Peck (17045418)
collection Figshare
description This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twin. We present a proposed methodology for red teaming a digital twin’s deployment that reduces risk whilst preserving utility. The common consultancy recommendation that security equivalence must be established is challenged given that a digital twin often represents a physical or cyber-physical system, with wider physical security and societal threats being identified.
format Default
Conference proceeding
id rr-article-27316317
institution Loughborough University
publishDate 2024
record_format Figshare
spelling rr-article-273163172024-11-05T15:37:19Z Treasure maps and special effects: The digital twin offering to threat actors Andrew Peck (17045418) Iain Phillips (1257654) Tim Watson (14370114) Cyber Security Digital Twin Threat Actors Red Teaming Risk Resilience Smart Cities This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twin. We present a proposed methodology for red teaming a digital twin’s deployment that reduces risk whilst preserving utility. The common consultancy recommendation that security equivalence must be established is challenged given that a digital twin often represents a physical or cyber-physical system, with wider physical security and societal threats being identified. 2024-11-05T15:37:19Z Text Conference contribution 2134/27316317.v1 https://figshare.com/articles/conference_contribution/Treasure_maps_and_special_effects_The_digital_twin_offering_to_threat_actors/27316317 All Rights Reserved
spellingShingle Cyber Security
Digital Twin
Threat Actors
Red Teaming
Risk
Resilience
Smart Cities
Andrew Peck
Iain Phillips
Tim Watson
Treasure maps and special effects: The digital twin offering to threat actors
title Treasure maps and special effects: The digital twin offering to threat actors
title_full Treasure maps and special effects: The digital twin offering to threat actors
title_fullStr Treasure maps and special effects: The digital twin offering to threat actors
title_full_unstemmed Treasure maps and special effects: The digital twin offering to threat actors
title_short Treasure maps and special effects: The digital twin offering to threat actors
title_sort treasure maps and special effects: the digital twin offering to threat actors
topic Cyber Security
Digital Twin
Threat Actors
Red Teaming
Risk
Resilience
Smart Cities
url https://hdl.handle.net/2134/27316317.v1