Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3387940.3391454acmconferencesArticle/Chapter ViewAbstractPublication PagesicseConference Proceedingsconference-collections
research-article
Open access

What happens in a control room during a cybersecurity attack?: Preliminary observations from a pilot study

Published: 25 September 2020 Publication History
  • Get Citation Alerts
  • Abstract

    Cyberattacks on the critical infrastructure is a growing concern for businesses, national authorities and public in general. The increasing complexity and connectivity of the critical infrastructure systems have made them susceptible to cyberattacks. The traditional notion of safety systems being isolated is no longer applicable, as we have seen ample examples on how these systems can be exploited through gaps in e.g. supply chain, physical security, insiders. This places greater importance on how the staff belonging to owners and operators of these critical infrastructure, e.g. operators, IT/security personnel, system engineers, management, are prepared to handle cyberattacks. This paper presents our ongoing research on investigating the preparedness of organisations to handle cybersecurity incidents and providing holistic solutions to improve cybersecurity posture. We present one experiment that has been conducted using our cybersecurity centre and man-machine laboratory to study how operators and security team of a power plant will handle a cyberattack. We highlight the main observations made through this experiment.

    References

    [1]
    Gyrd Skraaning Jr and Andreas Bye, 2011. The purpose of HAMMLAB and the theoretical basis for experimental research. In Ann Britt Skjerve and Andreas Bye, (Eds.), Simulator-based human factors studies across 25 years: The history of the Halden man-machine laboratory. London: Springer-Verlag.
    [2]
    Vikash Katta, Fabien Sechi, Per-Arne Jørgensen, Stine Strand, Per Axel Wiig, John Eidar Simensen, and Siv Hilde Houmb. 2019. Establishing a Cybersecurity Centre for Industrial Control Systems, In the proceedings of the 29th European Safety and Reliability Conference (ESREL '19).
    [3]
    George McCullough, 2019. Experiment data collection methodology for application in crew debriefs. 2019 Conference on nuclear training and education, Feb. 5-7, 2019. St. Augustine, FL. American Nuclear Society.
    [4]
    Christopher Poresky, Charalampos Andreades, James Kendrick and Per Peterson, 2017. Cybersecurity in Nuclear Power Plants: Insights for Advanced Nuclear Technologies.
    [5]
    IEC, 2016. IEC 62859:2016, Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity. International Electrotechnical Commission.
    [6]
    IEC, 2019. IEC 62859:2016+A1:2019. Nuclear power plants - Instrumentation and control systems - Requirements for coordinating safety and cybersecurity. International Electrotechnical Commission
    [7]
    Alexandra van Dine, Michael Assante and Page Stoutland, 2016. Outpacing cyber threats: Priorities for cybersecurity at nuclear facilities. Nuclear Threat Initiative.
    [8]
    Paul Cichonski, Tom Millar, Tim Grance, and Karen Scarfone, 2012. Computer security handling guide. Recommendations of the National Institute of Standards and Technology. Special publication 800--61. National Institute of Standards and Technology

    Cited By

    View all
    • (2024)A Survey of Cyber Range: Current Status, Analysis, and Future TrendsNetwork Simulation and Evaluation10.1007/978-981-97-4522-7_6(88-101)Online publication date: 2-Aug-2024
    • (2022)Survey Paper on IoT based Intrusion Detection System: Datasets and Techniques2022 3rd International Conference on Computing, Analytics and Networks (ICAN)10.1109/ICAN56228.2022.10007244(1-9)Online publication date: 18-Nov-2022
    • (2021)Investigating operative cybersecurity awareness in air traffic control2021 14th International Conference on Security of Information and Networks (SIN)10.1109/SIN54109.2021.9699158(1-8)Online publication date: 15-Dec-2021

    Index Terms

    1. What happens in a control room during a cybersecurity attack?: Preliminary observations from a pilot study

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Conferences
          ICSEW'20: Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops
          June 2020
          831 pages
          ISBN:9781450379632
          DOI:10.1145/3387940
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Sponsors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 25 September 2020

          Permissions

          Request permissions for this article.

          Check for updates

          Author Tags

          1. Control room
          2. Critical Infrastructure
          3. Cybersecurity
          4. Human factors
          5. Incident Response
          6. Safety

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          ICSE '20
          Sponsor:
          ICSE '20: 42nd International Conference on Software Engineering
          June 27 - July 19, 2020
          Seoul, Republic of Korea

          Upcoming Conference

          ICSE 2025

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)97
          • Downloads (Last 6 weeks)21
          Reflects downloads up to 12 Aug 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2024)A Survey of Cyber Range: Current Status, Analysis, and Future TrendsNetwork Simulation and Evaluation10.1007/978-981-97-4522-7_6(88-101)Online publication date: 2-Aug-2024
          • (2022)Survey Paper on IoT based Intrusion Detection System: Datasets and Techniques2022 3rd International Conference on Computing, Analytics and Networks (ICAN)10.1109/ICAN56228.2022.10007244(1-9)Online publication date: 18-Nov-2022
          • (2021)Investigating operative cybersecurity awareness in air traffic control2021 14th International Conference on Security of Information and Networks (SIN)10.1109/SIN54109.2021.9699158(1-8)Online publication date: 15-Dec-2021

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Get Access

          Login options

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media