IDEAS home Printed from https://ideas.repec.org/a/wly/crtinf/v1y2020i2p111-135.html
   My bibliography  Save this article

Control System Cyber Security

Author

Listed:
  • Joseph Weiss

Abstract

Cyber security for Information Technology (IT)/Operational Technology (OT) is about the protection of Internet protocol (IP) networks from cyber attacks. Control system cyber security is about protecting physical processes from unintentional incidents and malicious attacks. Technologically, control system cyber security is different than IT cyber security because of the control system devices and their low‐level communication protocols. Yet IT and OT cyber security policy has been developed by the network security organization with minimal participation from the engineering organizations that “own” the hardware and control systems. Control system cyber security is real—there have been more than 1,250 actual incidents identified to date.1 But there currently is widespread lack of appropriate control system cyber forensics and cyber security training. With the availability of IT cyber security hardware, testing, and training, IT systems continue to be compromised, and control system cyber security is arguably 5‐10 years behind IT. In addition to the need to upgrade control system cyber security at the levels of individual organizations and critical infrastructures, this is a matter of national security import. It was widely reported that a large Chinese‐built electric transformer may have contained hardware backdoors, allowing access to transformer equipment control parameters. (Wall Street Journal, 2020). Attack vectors in the control system area resulted in Presidential Executive Order (EO) 13920 in May 2020.2 Consequently, this paper advocates a paradigm shift to work around the current lack of a robust capability to secure control system networks. In order to address the limitations in securing control legacy and “next generation” control systems and networks, new approaches for improving control system cyber security and the ability to widely deploy them are needed.

Suggested Citation

  • Joseph Weiss, 2020. "Control System Cyber Security," Journal of Critical Infrastructure Policy, John Wiley & Sons, vol. 1(2), pages 111-135, September.
  • Handle: RePEc:wly:crtinf:v:1:y:2020:i:2:p:111-135
    DOI: 10.18278/jcip.1.2.7
    as

    Download full text from publisher

    File URL: https://doi.org/10.18278/jcip.1.2.7
    Download Restriction: no

    File URL: https://libkey.io/10.18278/jcip.1.2.7?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:wly:crtinf:v:1:y:2020:i:2:p:111-135. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Wiley Content Delivery (email available below). General contact details of provider: https://doi.org/10.1002/(ISSN)2693-3101 .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.