IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v38y2022ics1874548222000257.html
   My bibliography  Save this article

The drift of industrial control systems to pseudo security

Author

Listed:
  • Donnelly, Peter
  • Abuhmida, Mabrouka
  • Tubb, Christopher

Abstract

With the promise of a synergistic impact on the Efficiency-Thoroughness Trade-Off, Marketing is increasingly promoting types of Industrial Control Systems (ICS) that by some means combine the two usually segregated core ICS functions into one. A Basic Process Control System (BPCS) is combined with a Safety-Instrumented System (SIS) in a physically integrated form factor using shared resources of some kind. This paper suggests such a strategic choice of technology can result in functional safety (FS) hazards or security vulnerabilities, giving rise to resilience concerns. It takes a sceptical view of such an approach and instead proposes strict segregation of such functions and resources. In the context of critical national infrastructure (CNI), where potentially high consequence events (HCE) may arise from unplanned incidents, the outcome of this paper is to warn against the use of such architecture - even beyond that arena. Both ancient and modern, yet similarly strategic, historical decisions are used as metaphors to illustrate how sometimes insufficiently scrutinised technologies can be later regretted. Practical technical, organisational, and cultural measures are offered to steer against the headwind of commercial pressures in promoting integrated FS and security of the BPCS-SIS environment. A contribution is made of evidence-based, business intelligence gathering measures for BPCS-SIS vendor selection together with a proposal for an alternative, adopted application of proven Uncertainty Assessment Reporting techniques for industrial certification bodies and business stakeholders alike.

Suggested Citation

  • Donnelly, Peter & Abuhmida, Mabrouka & Tubb, Christopher, 2022. "The drift of industrial control systems to pseudo security," International Journal of Critical Infrastructure Protection, Elsevier, vol. 38(C).
  • Handle: RePEc:eee:ijocip:v:38:y:2022:i:c:s1874548222000257
    DOI: 10.1016/j.ijcip.2022.100535
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548222000257
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2022.100535?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:38:y:2022:i:c:s1874548222000257. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.