Skip to main content

2022 | OriginalPaper | Buchkapitel

Application TRIKE Methodology When Modeling Threats to APCs Information Security

verfasst von : D. Chernov

Erschienen in: Advances in Automation III

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the modern world automation technologies of industrial processes have found wide application. Automated process control systems have become an important part of enterprises that operate in different economic fields and life support facilities all over the world. Nevertheless, the high growth of automation means raises the acute problem of providing APCs information security from external and internal threats. There are systematic reports in the media about new critical vulnerabilities in industrial equipment and attacks based on the exploitation of such vulnerabilities. When designing such systems it is necessary to estimate possible information security threats that already exist in the system or that are predicted to appear. That is why threat modeling is an important part of providing information security at industrial facilities using automation. In this work the author investigates the methodology of estimating threats to software security TRIKE. The research is aimed at finding general approaches to determine threat sources, tactics, and techniques for making implementation scenarios of threats to software information security, for applying them to provide cyber security of automated process control systems. In the frameworks of the subject mainstreaming, the research gives a description of cyber-attacks at big industrial facilities, and their basic vulnerabilities are emphasized. In the article the analysis of TRIKE methodology has been done. It is aimed at determining basic threat modeling stages applicable to industrial automation systems. The approach of TRIKE methodology to generating a list of threats to information security is formalized. To achieve the aims the author constructs DFD data flow diagrams with the decomposition of peculiar elements of the algorithm for modeling threats to information security of automated process control systems using TRIKE methodology.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Aktual'nye kiberugrozy. 2 kvartal 2018 (Actual cyber threats. II quarter of 2018), Moscow, Positive Technologies (2018) Aktual'nye kiberugrozy. 2 kvartal 2018 (Actual cyber threats. II quarter of 2018), Moscow, Positive Technologies (2018)
2.
Zurück zum Zitat Panettieri, J.: Ransomware attack Rock City Power. Johannesburg, South Africa, MSSP Allert (2019) Panettieri, J.: Ransomware attack Rock City Power. Johannesburg, South Africa, MSSP Allert (2019)
3.
Zurück zum Zitat Aktual'nye kiberugrozy. 2 kvartal 2019 (Actual cyber threats. II quarter of 2019). Moscow, Positive Technologies (2019) Aktual'nye kiberugrozy. 2 kvartal 2019 (Actual cyber threats. II quarter of 2019). Moscow, Positive Technologies (2019)
4.
Zurück zum Zitat Aktual'nye kiberugrozy: itogi 2019 goda (Cybersecurity threatscape-2019), Moscow, Positive Technologies (2020) Aktual'nye kiberugrozy: itogi 2019 goda (Cybersecurity threatscape-2019), Moscow, Positive Technologies (2020)
6.
Zurück zum Zitat Eddington, M., Larcom, B., Saitta, E.: TRIKE v1 Methodology Document, USA. Octotrike (2005) Eddington, M., Larcom, B., Saitta, E.: TRIKE v1 Methodology Document, USA. Octotrike (2005)
11.
Zurück zum Zitat Pletnev, P.V., Belov, V.M.: Metodika ocenki riskov informacionnoj bezopasnosti na predpriyatiyah malogo i srednego biznesa (Methodology for assessing information security risks in small and medium-sized businesses). Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki 25(1–2), 83–86 (2012) Pletnev, P.V., Belov, V.M.: Metodika ocenki riskov informacionnoj bezopasnosti na predpriyatiyah malogo i srednego biznesa (Methodology for assessing information security risks in small and medium-sized businesses). Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki 25(1–2), 83–86 (2012)
12.
Zurück zum Zitat Semenov, D.A., Chichikin, G.Y.: Zashchita informacionnyh aktivov (Protection of information assets). Academy 57(6), 31–33 (2020) Semenov, D.A., Chichikin, G.Y.: Zashchita informacionnyh aktivov (Protection of information assets). Academy 57(6), 31–33 (2020)
13.
Zurück zum Zitat Rozdestvenskaya, T.E., Guznov, A.: Cifrovye finansovye aktivy: problemy i perspektivy pravovogo regulirovaniya (Digital financial assets: problems and prospects of legal regulation). Aktual’nye problemy rossijskogo prava 115(6), 43–54 (2020)CrossRef Rozdestvenskaya, T.E., Guznov, A.: Cifrovye finansovye aktivy: problemy i perspektivy pravovogo regulirovaniya (Digital financial assets: problems and prospects of legal regulation). Aktual’nye problemy rossijskogo prava 115(6), 43–54 (2020)CrossRef
14.
Zurück zum Zitat Tasvaeva, A.N.: Diagrammy potokov dannyh i variantov ispol’zovaniya kak instrumenty proektirovaniya informacionnyh sistem (Data flow diagrams and use cases as information system design tools). Modeli, sistemy, seti v ekonomike, tekhnike, prirode i obshchestve 3(2), 143–146 (2012) Tasvaeva, A.N.: Diagrammy potokov dannyh i variantov ispol’zovaniya kak instrumenty proektirovaniya informacionnyh sistem (Data flow diagrams and use cases as information system design tools). Modeli, sistemy, seti v ekonomike, tekhnike, prirode i obshchestve 3(2), 143–146 (2012)
15.
Zurück zum Zitat Kalyanov, G.N.: Konceptual’naya model’ DFD-tekhnologii (The conceptual model of DFD technology). Otkrytoe obrazovanie 21(4), 21–26 (2017) Kalyanov, G.N.: Konceptual’naya model’ DFD-tekhnologii (The conceptual model of DFD technology). Otkrytoe obrazovanie 21(4), 21–26 (2017)
16.
Zurück zum Zitat Zimovetc, O.A., Matorin, S.I.: Predstavlenie diagramm v notaciyah DFD, IDEF0 i BPMN s pomoshch’yu sistemno-ob”ektnyh modelej “Uzel-funkciya-ob”ekt” (Representation of diagrams in DFD, IDEF0, and BPMN notations using Node-Function-Object system-object models). Ekonomika. Informatika 20(19–1), 134–144 (2011) Zimovetc, O.A., Matorin, S.I.: Predstavlenie diagramm v notaciyah DFD, IDEF0 i BPMN s pomoshch’yu sistemno-ob”ektnyh modelej “Uzel-funkciya-ob”ekt” (Representation of diagrams in DFD, IDEF0, and BPMN notations using Node-Function-Object system-object models). Ekonomika. Informatika 20(19–1), 134–144 (2011)
18.
Zurück zum Zitat Verigo, A.A., Csapko, G.P., Katashev, A.S.: Ocenka uyazvimostej avtomatizirovannyh sistem upravleniya tekhnologicheskimi processami (Vulnerability assessment of automated process control systems). Mezhdunarodnyj nauchno-issledovatel’skij zhurnal 53(11–4), 47–49 (2016) Verigo, A.A., Csapko, G.P., Katashev, A.S.: Ocenka uyazvimostej avtomatizirovannyh sistem upravleniya tekhnologicheskimi processami (Vulnerability assessment of automated process control systems). Mezhdunarodnyj nauchno-issledovatel’skij zhurnal 53(11–4), 47–49 (2016)
20.
Zurück zum Zitat Konovalenko, S.A., Korolyov, I.D.: Vyyavlenie uyazvimostej informacionnyh sistem (Identifying information system vulnerabilities). Innovacii v nauke 58(9), 12–20 (2016) Konovalenko, S.A., Korolyov, I.D.: Vyyavlenie uyazvimostej informacionnyh sistem (Identifying information system vulnerabilities). Innovacii v nauke 58(9), 12–20 (2016)
21.
Zurück zum Zitat Muhanova, A., Revnivikh, A.V., Fedotov, A.M.: Klassifikaciya ugroz i uyazvimostej informacionnoj bezopasnosti v korporativnyh sistemah (Classification of threats and vulnerabilities of information security in corporate systems). Vestnik Novosibirskogo gosudarstvennogo universiteta. Seriya: Informacionnye tekhnologii 11(2), 55–72 (2013) Muhanova, A., Revnivikh, A.V., Fedotov, A.M.: Klassifikaciya ugroz i uyazvimostej informacionnoj bezopasnosti v korporativnyh sistemah (Classification of threats and vulnerabilities of information security in corporate systems). Vestnik Novosibirskogo gosudarstvennogo universiteta. Seriya: Informacionnye tekhnologii 11(2), 55–72 (2013)
22.
Zurück zum Zitat Chernov, D.V., Sychugov, A.A.: Application of the method of determining the degree of danger of destructive actions to solve the problem of information security of APCs. In: 2020 International Conference on Electrotechnical Complexes and Systems (ICOECS), Ufa, pp. 1–4 (2020). https://doi.org/10.1109/ICOECS50468.2020.9278479 Chernov, D.V., Sychugov, A.A.: Application of the method of determining the degree of danger of destructive actions to solve the problem of information security of APCs. In: 2020 International Conference on Electrotechnical Complexes and Systems (ICOECS), Ufa, pp. 1–4 (2020). https://​doi.​org/​10.​1109/​ICOECS50468.​2020.​9278479
Metadaten
Titel
Application TRIKE Methodology When Modeling Threats to APCs Information Security
verfasst von
D. Chernov
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-94202-1_42

Neuer Inhalt