SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System

SCIPS: Using Experiential Learning to Raise Cyber Situational Awareness in Industrial Control System

Allan Cook (De Montfort University, Leicester, United Kingdom), Richard G. Smith (De Montfort University, Leicester, United Kingdom), Leandros Maglaras (De Montfort University, Leicester, United Kingdom) and Helge Janicke (De Montfort University, Leicester, United Kingdom)
Copyright: © 2017 |Pages: 15
DOI: 10.4018/IJCWT.2017040101

Abstract

The cyber threat to industrial control systems is an acknowledged security issue, but a qualified dataset to quantify the risk remains largely unavailable. Senior executives of facilities that operate these systems face competing requirements for investment budgets, but without an understanding of the nature of the threat, cyber security may not be a high priority. Education and awareness campaigns are established methods of raising the profile of security issues with stakeholders, but traditional techniques typically deliver generic messages to wide audiences, rather than tailoring the communications to those who understand the impact of organisational risks. This paper explores the use of experiential learning through serious games for senior executives, to develop mental models within which participants can frame the nature of the threat, thereby raising their cyber security awareness, and increasing their motivation to address the issue.
Article Preview

Introduction

The cyber threat to critical national infrastructure (CNI), underpinned by industrial control systems (ICS) is an acknowledged national security challenge (The White House, 2013). For several years, vulnerabilities have been reported in ICS, with observable increases in cyber threats between 2011 and 2015 (ICS-CERT, 2011, 2012, 2013, 2016). ICS often use operating systems, applications and procedures that may be considered unconventional by contemporary IT professionals. These systems have operational requirements including the management of processes that, if not executed in a predictable manner, may result in injury, loss of life, damage to the environment, as well as serious financial issues (Stouffer, Falco, & Scarfone, 2011; Lopez, Alcaraz, & Roman, 2013; Gao & Morris, 2014; Mitchell & Chen, 2014; Du¨bendorfer, Wagner, & Plattner, 2004). Several factors have contributed to the escalation of risks specific to control systems, including the adoption of standardised technologies with known security deficiencies, connectivity of control systems with other networks, the use of insecure remote connections, and widespread availability of technical information about control systems (ICS-CERT, 2016; GAO, 2004; Office, 2011; Wueest, 2014; Kaspersky, 2014).

Whilst the complexity of ICS may deter some opportunistic actors, capable antagonists, characterised as Advanced Persistent Threats (APTs), pose a credible risk (Center, 2013). In 2014, 55 percent of incidents investigated by ICS-CERT involved APTs or sophisticated actors (ICS-CERT, 2016). However, to date, there have been limited documented instances of such incidents (Langner, 2013; Bencsa´th, P´ek, Butty´an, & Felegyhazi, 2012). The North American Electric Reliability Corporation (NERC) characterised the possible frequency of these incidents as low, but with the capacity for significant impact (NERC, 2010).

Despite the infrequency of reported ICS incidents, the APT risk remains at large. By their nature, APT attacks are covert and difficult to detect, with a degree of tailoring available to the antagonist in order to achieve focused outcomes on the target network. However, it has been demonstrated that APTs follow a common attack lifecycle, performed in several phases, that can be broadly characterised as reconnaissance, preparation, execution, gaining access, information gathering and connection maintenance (Vukalovi´c & Delija, 2015). An analysis of advanced threat actors in 2013 detected 4,192 attacks associated with APT groups with 17,995 unique malware infections (FireEye, 2014). Therefore, an ill-prepared ICS operator may struggle to recover from an APT attack, as a well-trained response team that understands the nature of the antagonist is critical to success in APT incidents (Cole, 2012).

To address this potential threat, risk management literature asserts that a risk can be described as the answer to three questions; 1) what can happen? (i.e., what can go wrong?), 2) how likely is it that it will happen?, and 3) if it does happen, what are the consequences? (Kaplan & Garrick, 1981). However, as the level of incident reporting has not produced a sufficiently quantified and observable set of metrics for cyber attacks on ICS to inform generally-accepted risk models, there is limited value in the probability judgments based on such techniques (Cook, Smith, Maglaras, & Janicke, 2016a).

Complete Article List

Search this Journal:
Reset
Open Access Articles: Forthcoming
Volume 9: 4 Issues (2019): Forthcoming, Available for Pre-Order
Volume 8: 4 Issues (2018): 3 Released, 1 Forthcoming
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2013)
Volume 2: 4 Issues (2012)
Volume 1: 4 Issues (2011)
View Complete Journal Contents Listing