Threats on the horizon: understanding security threats in the era of cyber-physical systems

Steven Walker-Roberts, Mohammad Hammoudeh*, Omar Aldabbas, Mehmet Aydin, Ali Dehghantanha

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

66 Scopus citations

Abstract

Disruptive innovations of the last few decades, such as smart cities and Industry 4.0, were made possible by higher integration of physical and digital elements. In today’s pervasive cyber-physical systems, connecting more devices introduces new vulnerabilities and security threats. With increasing cybersecurity incidents, cybersecurity professionals are becoming incapable of addressing what has become the greatest threat climate than ever before. This research investigates the spectrum of risk of a cybersecurity incident taking place in the cyber-physical-enabled world using the VERIS Community Database. The findings were that the majority of known actors were from the US and Russia, most victims were from western states and geographic origin tended to reflect global affairs. The most commonly targeted asset was information, with the majority of attack modes relying on privilege abuse. The key feature observed was extensive internal security breaches, most often a result of human error. This tends to show that access in any form appears to be the source of vulnerability rather than incident specifics due to a fundamental trade-off between usability and security in the design of computer systems. This provides fundamental evidence of the need for a major reevaluation of the founding principles in cybersecurity.

Original languageEnglish
Pages (from-to)2643-2664
Number of pages22
JournalJournal of Supercomputing
Volume76
Issue number4
DOIs
StatePublished - 1 Apr 2020
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2019, The Author(s).

Keywords

  • Cyber defence
  • Cyber-physical systems
  • Cyberattacks
  • VCDB
  • VERIS

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Information Systems
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Threats on the horizon: understanding security threats in the era of cyber-physical systems'. Together they form a unique fingerprint.

Cite this