Loading…
Treasure maps and special effects: The digital twin offering to threat actors
This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twi...
Saved in:
Main Authors: | , , |
---|---|
Format: | Default Conference proceeding |
Published: |
2024
|
Subjects: | |
Online Access: | https://hdl.handle.net/2134/27316317.v1 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1818176490622156800 |
---|---|
author | Andrew Peck Iain Phillips Tim Watson |
author_facet | Andrew Peck Iain Phillips Tim Watson |
author_sort | Andrew Peck (17045418) |
collection | Figshare |
description | This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twin. We present a proposed methodology for red teaming a digital twin’s deployment that reduces risk whilst preserving utility. The common consultancy recommendation that security equivalence must be established is challenged given that a digital twin often represents a physical or cyber-physical system, with wider physical security and societal threats being identified. |
format | Default Conference proceeding |
id | rr-article-27316317 |
institution | Loughborough University |
publishDate | 2024 |
record_format | Figshare |
spelling | rr-article-273163172024-11-05T15:37:19Z Treasure maps and special effects: The digital twin offering to threat actors Andrew Peck (17045418) Iain Phillips (1257654) Tim Watson (14370114) Cyber Security Digital Twin Threat Actors Red Teaming Risk Resilience Smart Cities This paper considers the offering made to threat actors by the deployment of digital twins around Operational Technology (OT), IoT and Smart City environments. In the context of a model for threat actor types it explores misuse cases that may be possible given an available or compromised digital twin. We present a proposed methodology for red teaming a digital twin’s deployment that reduces risk whilst preserving utility. The common consultancy recommendation that security equivalence must be established is challenged given that a digital twin often represents a physical or cyber-physical system, with wider physical security and societal threats being identified. 2024-11-05T15:37:19Z Text Conference contribution 2134/27316317.v1 https://figshare.com/articles/conference_contribution/Treasure_maps_and_special_effects_The_digital_twin_offering_to_threat_actors/27316317 All Rights Reserved |
spellingShingle | Cyber Security Digital Twin Threat Actors Red Teaming Risk Resilience Smart Cities Andrew Peck Iain Phillips Tim Watson Treasure maps and special effects: The digital twin offering to threat actors |
title | Treasure maps and special effects: The digital twin offering to threat actors |
title_full | Treasure maps and special effects: The digital twin offering to threat actors |
title_fullStr | Treasure maps and special effects: The digital twin offering to threat actors |
title_full_unstemmed | Treasure maps and special effects: The digital twin offering to threat actors |
title_short | Treasure maps and special effects: The digital twin offering to threat actors |
title_sort | treasure maps and special effects: the digital twin offering to threat actors |
topic | Cyber Security Digital Twin Threat Actors Red Teaming Risk Resilience Smart Cities |
url | https://hdl.handle.net/2134/27316317.v1 |