Prioritizing Obstacles to Industrial Control Systems Security Management Implementation, using Interpretive Structural Modeling (ISM) Approach

Document Type : Original Article

Authors

payam noor university

Abstract

Although information system security has been developed extensively, industrial control systems (ICS) security is a newly developed concept and is still unknown to some organizations. Increasing the access to ICS and the related networks, has increased the challenges their security is facing. On the other hand, to those organizations which are aware of the importance of this issue, the roadmap is vague. In this article, we prioritize the obstacles to implementation of ICS security management, using the interpretive structural modeling (ISM). Mobarakeh Steel Company is studied as a case here. The identified barriers, are           investigated by expert staff in the form of pair wise comparison matrices, and the results are prioritized. Also, by using Matriced’ Impacts Croise’s Multiplication Applique´e a UN Classement (MICMAC) analysis method, the barriers effectiveness and dependencies are obtained. Analyzing the results indicates the "unawareness and lack of knowledge of staff" as the most fundamental obstacle, and "non-native plans"  and "lack of the security supervisor in the organization" as the elements that should be considered while the     organization is dealing with cyber security. At the end, the correlation relation between the obstacles’    significance level and their dependencies is studied using Spearman correlation coefficient method,        revealing strong inverse relation between those two elements. This shows that less dependent obstacles have effects which are stronger and in the more fundamental level.
 

Keywords


[1]     E. Luiijf, and B. Jan te Paske, “Cyber Security of Industrial Control Systems,” TNO, The Hague, The Netherlands, 2015.##
[2]     W. Knowles, D. Prince, and D. Hutchison, “A survey of cyber security management in industrial control systems,” Science Direct Journal, Published by Elsevier B.V, 3 March 2015.##
[3]     S. Akbari, “The Basics of Distributed Control Systems,” Tehran, Publishing Idehnegar, 2014. (In Persian)##
[4]     G. D. Sadowsky, X. James, A. Greenberg, B. J. Mack, and A. Schwartz, “Information Technology Security Handbook,” USA, publisher: The World Bank, 2003.##
[5]     “International Standard Organization,” ISO 27001 Edition 2005: Information Technology, Security Techniques, Information Security Management Systems, Requirements, Translation: Institute for Standard and Industrial Research of Iran, 2008. (In Persian)##
[6]     T. J. Mowbray, “Cybersecurity Managing Systems,” Conducting Testing, and Investigating Intrusions, Indiana (USA), John Wiley & Sons, 2014.##
[7]     J. M. Colbert and E. K. Alexander, “Cyber-security of SCADA and other Industrial Control Systems,” Switzerland: Springer International Publishing, 2016.##
[8]     S. Tarasi, “Identification and Prioritization of Barriers to Implementing Industrial control systems Security Management with Interpretative Structural Modeling (ISM),” Case Study of Mobarakeh Steel Co., Master's thesis, Payame Noor University Tehran West, 2018. (In Persian)##
[9]     A. Azar and F. Khosravani, “Investigating Soft Operations (Problems Structural Approaches),” Tehran, the publisher of the Industrial Management Organization, 1392. (In Persian)##
[10]  G. R. Khaki, “Research method with a dissertational approach,” Tehran, Payame Noor University Press, 2011. (In Persian)##
[11]  D. E. Hinkle, W. Wiersma, and S. G. Jurs, “Applied Statistics for the Behavioral Sciences,” 5th ed. Boston, Houghton Mifflin, 2003.##