A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)

被引:0
|
作者
Plachkinova, Miloslava [1 ]
Vo, Ace [2 ]
机构
[1] Kennesaw State Univ, Informat Syst & Secur Dept, Coles Coll Business, Kennesaw, GA 30144 USA
[2] Loyola Marymount Univ, Dept Informat Syst & Business Analyt, Coll Business Adm, Los Angeles, CA USA
来源
COMMUNICATIONS OF THE ASSOCIATION FOR INFORMATION SYSTEMS | 2023年 / 52卷
关键词
Cybercrime; Cyberterrorism; Cybersecurity; Critical Infrastructure; Routine Activity Theory; Rational Choice Theory; Design Science Research; ROUTINE ACTIVITY THEORY; DESIGN SCIENCE; STUXNET; CRIME;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrime against critical infrastructure such as nuclear reactors, power plants, and dams has been increasing in frequency and severity. Recent literature regarding these types of attacks has been extensive but due to the sensitive nature of this field, there is very little empirical data. We address these issues by integrating Routine Activity Theory and Rational Choice Theory, and we create a classification tool called TRACI (Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure). We take a Design Science Research approach to develop, evaluate, and refine the proposed artifact. We use mix methods to demonstrate that our taxonomy can successfully capture the characteristics of various cyberattacks against critical infrastructure. TRACI consists of three dimensions, and each dimension contains its own subdimensions. The first dimension comprises of hacker motivation, which can be financial, socio-cultural, thrill-seeking, and/or economic. The second dimension represents the assets such as cyber, physical, and/or cyber-physical components. The third dimension is related to threats, vulnerabilities, and controls that are fundamental to establishing and maintaining an information security posture and overall cyber resilience. Our work is among the first to utilize criminological theories and Design Science to create an empirically validated artifact for improving critical infrastructure risk management.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Preliminary interdependency analysis: An approach to support critical-infrastructure risk-assessment
    Bloomfield, Robin E.
    Popov, Peter
    Salako, Kizito
    Stankovic, Vladimir
    Wright, David
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 167 : 198 - 217
  • [42] Risk Assessment of Critical Energy Infrastructure Considering Physical and Cyber Assets: Methodology and Models
    Ivanchenko, Oleg
    Kharchenko, Vyacheslav
    Moroz, Borys
    Kabak, Leonid
    Konovalenko, Serhii
    PROCEEDINGS OF THE 2018 IEEE 4TH INTERNATIONAL SYMPOSIUM ON WIRELESS SYSTEMS WITHIN THE INTERNATIONAL CONFERENCES ON INTELLIGENT DATA ACQUISITION AND ADVANCED COMPUTING SYSTEMS (IDAACS-SWS), 2018, : 225 - 228
  • [43] Flood Risk Assessment on Selected Critical Infrastructure in Kota Marudu Town, Sabah, Malaysia
    Ayog, Janice Lynn
    Tongkul, Felix
    Mirasa, Abdul Karim
    Roslee, Rodeano
    Dullah, Salinah
    INTERNATIONAL SYMPOSIUM ON CIVIL AND ENVIRONMENTAL ENGINEERING 2016 (ISCEE 2016), 2017, 103
  • [44] Risk Assessment in Critical Infrastructure Security Modelling Based on Dependency Analysis (Short Paper)
    Schaberreiter, Thomas
    Kittila, Kati
    Halunen, Kimmo
    Roning, Juha
    Khadraoui, Djamel
    CRITICAL INFORMATION INFRASTRUCTURE SECURITY, CRITIS 2011, 2013, 6983 : 213 - 217
  • [45] Advanced methodology for risk and vulnerability assessment of interdependency of critical infrastructure in respect to urban floods
    Serre, Damien
    3RD EUROPEAN CONFERENCE ON FLOOD RISK MANAGEMENT (FLOODRISK 2016), 2016, 7
  • [46] Cloud Attack and Risk Assessment Taxonomy
    Juliadotter, Nina Viktoria
    Choo, Kim-Kwang Raymond
    IEEE CLOUD COMPUTING, 2015, 2 (01): : 14 - 20
  • [47] Risk Forecast Assessment of Transmission Line Capacity Increase Under Cyberattacks
    Chen Zhengganzhe
    Zhang Bin
    Li Junyi
    Wu Yunfa
    2022 IEEE 17TH INTERNATIONAL CONFERENCE ON CONTROL & AUTOMATION, ICCA, 2022, : 943 - 947
  • [48] Regional critical infrastructure assessment: Kansas City
    Myers, James D.
    Sorrentino, Michael A., Jr.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURES, 2011, 7 (01) : 58 - 72
  • [49] Beyond infrastructure: A critical assessment of GII initiatives
    Hudson, HE
    COMPETITION, REGULATION, AND CONVERGENCE: CURRENT TRENDS IN TELECOMMUNICATIONS POLICY RESEARCH, 1999, : 159 - 176
  • [50] CRITICAL INFRASTRUCTURE PROTECTION: THREATS MINING AND ASSESSMENT
    Digioia, Giusj
    Panzieri, Stefano
    INTERNATIONAL DEFENSE AND HOMELAND SECURITY SIMULATION WORKSHOP (DHSS 2012), 2012, : 67 - 72