Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

المؤلفون المشاركون

Shin, Jiho
You, Ilsun
Seo, Jung Taek

المصدر

Mobile Information Systems

العدد

المجلد 2020، العدد 2020 (31 ديسمبر/كانون الأول 2020)، ص ص. 1-11، 11ص.

الناشر

Hindawi Publishing Corporation

تاريخ النشر

2020-11-27

دولة النشر

مصر

عدد الصفحات

11

التخصصات الرئيسية

هندسة الاتصالات

الملخص EN

The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements.

In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information Security Requirements) proposed by the National Security Research Institute (NSRI) and established by the Telecommunications Technology Association (TTA) is being used.

However, it is difficult to apply security requirements of TTAK.KO-12.0307 uniformly because of the reason that the characteristics of the ICS in each layer are different.

There is also a limit to invest the security resources with equivalent priority for all requirements and ICS layers.

It is still unresolved in the previous research studies which are related to information security resources, for example, Choi (2013), Ko et al.

(2013), and Nah et al.’s (2016) studies.

Therefore, this study tried to focus on what a top priority of information security requirements by the ICS in each layer is, using the analytic hierarchy process.

As a result, we derived that the top priority requirement in the operation layer is “Identification Authentication Access Control,” in the control layer is “Event Response,” and in the field device layer is “Physical Interface Protection” with the highest importance.

The results of this study can be utilized as a guideline for the security strategy and policy design by determining security requirements that should be prioritized in each layer of the ICS.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Shin, Jiho& You, Ilsun& Seo, Jung Taek. 2020. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mobile Information Systems،Vol. 2020, no. 2020, pp.1-11.
https://search.emarefa.net/detail/BIM-1192571

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Shin, Jiho…[et al.]. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mobile Information Systems No. 2020 (2020), pp.1-11.
https://search.emarefa.net/detail/BIM-1192571

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Shin, Jiho& You, Ilsun& Seo, Jung Taek. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mobile Information Systems. 2020. Vol. 2020, no. 2020, pp.1-11.
https://search.emarefa.net/detail/BIM-1192571

نوع البيانات

مقالات

لغة النص

الإنجليزية

الملاحظات

Includes bibliographical references

رقم السجل

BIM-1192571