Skip to main content

2022 | OriginalPaper | Buchkapitel

Software Package for Training Users to Respond to Information Security Incidents in Industrial Automated Systems

verfasst von : M. Tumbinskaya, A. Abzalov, I. Davydova

Erschienen in: Advances in Automation III

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The article considers the issue of increasing the level of security of industrial automated systems by automating the training of users to respond to information security incidents. A software package for training users to respond to information security incidents in industrial automated systems is proposed. The article presents an overview of the information security state in industrial automated systems: the damage from cyber threats, types of attacks and objects of attacks in industrial automated systems, confidential information of the attackers’ interest. The study examined the impact of the users’ information security knowledge level on improving the quality of users’ response to information security incidents to increase the level of industrial automated systems security and prevent information security threats. 4 classes of attacks were investigated: 1) attacks using malicious software, 2) DoS-type attacks, 3) attacks using social engineering methods, 4) credential matching attacks. The results of the study and experimental data confirm the effectiveness of the proposed software package, which made it possible to increase the industrial automated system security level by an average of 28%.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Wang, X., Shuai, N.: The multilevel comprehensive grey evaluation model for enterprise training effect. In: International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing, pp. 51–54 (2009) Wang, X., Shuai, N.: The multilevel comprehensive grey evaluation model for enterprise training effect. In: International Workshop on Education Technology and Training & 2008 International Workshop on Geoscience and Remote Sensing, pp. 51–54 (2009)
2.
Zurück zum Zitat Mokhtar, I.A., Majid, S., Foo, S.: Using information technology to improve health information literacy in Singapore-an exploratory study. In: IEEE International Conference on Information & Communications Technology, pp. 1–2 (2007) Mokhtar, I.A., Majid, S., Foo, S.: Using information technology to improve health information literacy in Singapore-an exploratory study. In: IEEE International Conference on Information & Communications Technology, pp. 1–2 (2007)
3.
Zurück zum Zitat Komalasari, N., Murad, D.F., Agustine, D., Irsan, M., Budiman, J., Fernando, E.: Effect of education, performance, position and information technology competency of information systems to performance of information system. In: IEEE International Seminar on Research of Information Technology and Intelligent Systems, pp. 221–226 (2019) Komalasari, N., Murad, D.F., Agustine, D., Irsan, M., Budiman, J., Fernando, E.: Effect of education, performance, position and information technology competency of information systems to performance of information system. In: IEEE International Seminar on Research of Information Technology and Intelligent Systems, pp. 221–226 (2019)
4.
Zurück zum Zitat Lee, J., Kim, Y.S., Kim, J.H., Kim, I.K.: Toward the SIEM architecture for cloud-based security services. In: IEEE Conference on Communications and Network Security, pp. 398–399 (2017) Lee, J., Kim, Y.S., Kim, J.H., Kim, I.K.: Toward the SIEM architecture for cloud-based security services. In: IEEE Conference on Communications and Network Security, pp. 398–399 (2017)
5.
Zurück zum Zitat Okubo, N., Nara, K., Takemura, S., Ueda, Y.: Applying an instructional design process to development of an independent verification and validation training program. In: IEEE 29th International Conference on Software Engineering Education and Training, pp. 237–240 (2016) Okubo, N., Nara, K., Takemura, S., Ueda, Y.: Applying an instructional design process to development of an independent verification and validation training program. In: IEEE 29th International Conference on Software Engineering Education and Training, pp. 237–240 (2016)
6.
Zurück zum Zitat Kumar, S., Arekar, K., Jain, R.: The impact of effectiveness of the simulator training program on different factors of needs and interest of the training. In: IEEE International Conference on Next Generation Computing Technologies, pp. 485–489 (2017) Kumar, S., Arekar, K., Jain, R.: The impact of effectiveness of the simulator training program on different factors of needs and interest of the training. In: IEEE International Conference on Next Generation Computing Technologies, pp. 485–489 (2017)
7.
Zurück zum Zitat Belikova, T., Lekakh, A., Dovbenko, O., Dodukh, O.: Method of increasing the capacity of information threat detection filters in modern information and communication systems. In: IEEE International Conference on Advanced Information and Communications Technologies, pp. 426–429 (2019) Belikova, T., Lekakh, A., Dovbenko, O., Dodukh, O.: Method of increasing the capacity of information threat detection filters in modern information and communication systems. In: IEEE International Conference on Advanced Information and Communications Technologies, pp. 426–429 (2019)
8.
Zurück zum Zitat Hershey, P., Silio, C.B.: Systems engineering approach for event monitoring and analysis in high speed enterprise communications systems. In: Annual IEEE Systems Conference, pp. 344–349 (2009) Hershey, P., Silio, C.B.: Systems engineering approach for event monitoring and analysis in high speed enterprise communications systems. In: Annual IEEE Systems Conference, pp. 344–349 (2009)
9.
Zurück zum Zitat Rathnayake, N., Meedeniya, D., Perera, I., Welivita, A.: A framework for adaptive user interface generation based on user behavioural patterns. In: IEEE Moratuwa Engineering Research Conference, pp. 698–703 (2019) Rathnayake, N., Meedeniya, D., Perera, I., Welivita, A.: A framework for adaptive user interface generation based on user behavioural patterns. In: IEEE Moratuwa Engineering Research Conference, pp. 698–703 (2019)
10.
Zurück zum Zitat Tomilin, A., Tumbinskaya, M., Tregubov, V., Smolevitskaya, M.: The BESM-6 virtualization project. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 241–245 (2017) Tomilin, A., Tumbinskaya, M., Tregubov, V., Smolevitskaya, M.: The BESM-6 virtualization project. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 241–245 (2017)
11.
Zurück zum Zitat Gizatullin, Z., Gizatullin, R., Drozdikov, V.: Research of noise immunity of computer equipment of control systems under action of pulsed magnetic field. In: IEEE International Russian Automation Conference, pp. 65–69 (2019) Gizatullin, Z., Gizatullin, R., Drozdikov, V.: Research of noise immunity of computer equipment of control systems under action of pulsed magnetic field. In: IEEE International Russian Automation Conference, pp. 65–69 (2019)
12.
Zurück zum Zitat Gizatullin, Z., Shkinderov, M., Arkhipov, A.: Research of resonant effects in interconnects of multilayer PCB of computing equipment. In: IEEE International Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 116–119 (2020) Gizatullin, Z., Shkinderov, M., Arkhipov, A.: Research of resonant effects in interconnects of multilayer PCB of computing equipment. In: IEEE International Conference of Russian Young Researchers in Electrical and Electronic Engineering, pp. 116–119 (2020)
13.
Zurück zum Zitat Gizatullin, Z., Konstantinov, E.: Technique for research spurious electromagnetic emission from electronic means. In: IEEE International Russian Automation Conference, pp. 380–384 (2020) Gizatullin, Z., Konstantinov, E.: Technique for research spurious electromagnetic emission from electronic means. In: IEEE International Russian Automation Conference, pp. 380–384 (2020)
14.
Zurück zum Zitat Akanmu, S.A., Jamaludin, Z.: A user-centered design methodology for students’ data-focused InfoVis. In: IEEE International Conference on User Science and Engineering, pp. 115–118 (2015) Akanmu, S.A., Jamaludin, Z.: A user-centered design methodology for students’ data-focused InfoVis. In: IEEE International Conference on User Science and Engineering, pp. 115–118 (2015)
15.
Zurück zum Zitat Ahma, I., Jaafar, A.: Games design and integration with user’s emotion. In: IEEE International Conference on User Science and Engineering, pp. 69–72 (2012) Ahma, I., Jaafar, A.: Games design and integration with user’s emotion. In: IEEE International Conference on User Science and Engineering, pp. 69–72 (2012)
16.
Zurück zum Zitat Ying, J., Gračanin, D.: Poster: an approach to development of adaptive 3D user interfaces. In: IEEE Symposium on 3D User Interfaces, pp. 169–170 (2012) Ying, J., Gračanin, D.: Poster: an approach to development of adaptive 3D user interfaces. In: IEEE Symposium on 3D User Interfaces, pp. 169–170 (2012)
17.
Zurück zum Zitat Hasim, W., Wibirama, S., Nugroho, H.A.: Redesign of E-participation using user-centered design approach for improving user experience. In: IEEE International Conference on Information and Communications Technology, pp. 857–861 (2019) Hasim, W., Wibirama, S., Nugroho, H.A.: Redesign of E-participation using user-centered design approach for improving user experience. In: IEEE International Conference on Information and Communications Technology, pp. 857–861 (2019)
18.
Zurück zum Zitat Li, M., Li, L., Jiao, R., Xiao, H.: Virtrul reality and artificial intelligence support future training development. In: IEEE Chinese Automation Congress, pp. 416–419 (2018) Li, M., Li, L., Jiao, R., Xiao, H.: Virtrul reality and artificial intelligence support future training development. In: IEEE Chinese Automation Congress, pp. 416–419 (2018)
19.
Zurück zum Zitat Gibadullin, R.F., Baimukhametova, G.A., Perukhin, M.Yu.: Service-oriented distributed energy data management using big data technologies. In: IEEE International Conference on Industrial Engineering, Applications and Manufacturing, pp. 45–49 (2019) Gibadullin, R.F., Baimukhametova, G.A., Perukhin, M.Yu.: Service-oriented distributed energy data management using big data technologies. In: IEEE International Conference on Industrial Engineering, Applications and Manufacturing, pp. 45–49 (2019)
20.
Zurück zum Zitat Sharipov, R., Tumbinskaya, M., Abzalov, A.: Analysis of users’ keyboard handwriting based on Gaussian reference signals. In: IEEE International Russian Automation Conference, pp. 28–32 (2019) Sharipov, R., Tumbinskaya, M., Abzalov, A.: Analysis of users’ keyboard handwriting based on Gaussian reference signals. In: IEEE International Russian Automation Conference, pp. 28–32 (2019)
21.
Zurück zum Zitat Garae, J., Ko, R.K.L., Apperley, M.: A full-scale security visualization effectiveness measurement and presentation approach. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 639–650 (2018) Garae, J., Ko, R.K.L., Apperley, M.: A full-scale security visualization effectiveness measurement and presentation approach. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications, pp. 639–650 (2018)
25.
Zurück zum Zitat Gibadullin, R.F., Vershinin, I.S., Minyazev, R.Sh.: Development of load balancer and parallel database management module. In: IEEE International Conference on Industrial Engineering, Applications and Manufacturing, pp. 33–39 (2018) Gibadullin, R.F., Vershinin, I.S., Minyazev, R.Sh.: Development of load balancer and parallel database management module. In: IEEE International Conference on Industrial Engineering, Applications and Manufacturing, pp. 33–39 (2018)
26.
Zurück zum Zitat Yakimov, I., Tregubov, V., Tumbinskaya, M.: Creation of a unified industrial basis for the development and supply of applied research program packages at the Kazan computer factory. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 126–130 (2017) Yakimov, I., Tregubov, V., Tumbinskaya, M.: Creation of a unified industrial basis for the development and supply of applied research program packages at the Kazan computer factory. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 126–130 (2017)
27.
Zurück zum Zitat Petrovsky, V., Tumbinskaya, M.: The history and prospects of information security at Russian enterprises. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 150–153 (2014) Petrovsky, V., Tumbinskaya, M.: The history and prospects of information security at Russian enterprises. In: IEEE International Conference on Computer Technology in Russia and in the Former Soviet Union, pp. 150–153 (2014)
28.
Zurück zum Zitat Gumerov, V., et al.: Quality functions modeling of industrial enterprises products. Int. Rev. Manage. Market. 6(1), 165–169 (2016) Gumerov, V., et al.: Quality functions modeling of industrial enterprises products. Int. Rev. Manage. Market. 6(1), 165–169 (2016)
29.
Zurück zum Zitat Tumbinskaya, M.V.: Process of distribution of undesirable information in social networks. Bus. Inform. 3, 65–76 (2017)CrossRef Tumbinskaya, M.V.: Process of distribution of undesirable information in social networks. Bus. Inform. 3, 65–76 (2017)CrossRef
30.
Zurück zum Zitat Tumbinskaya, M.V., Bayanov, B.I., Rakhimov, R., Kormiltcev, N.V., Uvarov, A.D.: Analysis and forecast of undesirable cloud services traffic. Bus. Inform. 13(1), 71–81 (2019)CrossRef Tumbinskaya, M.V., Bayanov, B.I., Rakhimov, R., Kormiltcev, N.V., Uvarov, A.D.: Analysis and forecast of undesirable cloud services traffic. Bus. Inform. 13(1), 71–81 (2019)CrossRef
Metadaten
Titel
Software Package for Training Users to Respond to Information Security Incidents in Industrial Automated Systems
verfasst von
M. Tumbinskaya
A. Abzalov
I. Davydova
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-94202-1_41