Assessment of the cybersecurity vulnerability of construction networks

被引:14
|
作者
Mantha, Bharadwaj R. K. [1 ]
Garcia de Soto, Borja [1 ]
机构
[1] New York Univ Abu Dhabi NYUAD, Div Engn, SMART Construct Res Grp, Abu Dhabi, U Arab Emirates
关键词
Construction network; CVSS; Cybersecurity; Risk management; Security score; Vulnerability assessment; Vulnerability metrics; RISKS;
D O I
10.1108/ECAM-06-2020-0400
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Purpose The aim of this study is o examine the advantages and disadvantages of different existing scoring systems in the cybersecurity domain and their applicability to the AEC industry and to systematically apply a scoring system to determine scores for some of the most significant construction participants. Design/methodology/approach This study proposes a methodology that uses the Common Vulnerability Scoring System (CVSS) to calculate scores and the likelihood of occurrence based on communication frequencies to ultimately determine risk categories for different paths in a construction network. As a proof of concept, the proposed methodology is implemented in a construction network from a real project found in the literature. Findings Results show that the proposed methodology could provide valuable information to assist project participants to assess the overall cybersecurity vulnerability of construction and assist during the vulnerability-management processes. For example, a project owner can use this information to get a better understanding of what to do to limit its vulnerability, which will lead to the overall improvement of the security of the construction network. Research limitations/implications It has to be noted that the scoring systems, the scores and categories adopted in the study need not necessarily be an exact representation of all the construction participants or networks. Therefore, caution should be exercised to avoid generalizing the results of this study. Practical implications The proposed methodology can provide valuable information and assist project participants to assess the overall cyber-vulnerability of construction projects and support the vulnerability-management processes. For example, a project owner can use this approach to get a better understanding of what to do to limit its cyber-vulnerability exposure, which will ultimately lead to the overall improvement of the construction network's security. This study will also help raise more awareness about the cybersecurity implications of the digitalization and automation of the AEC industry among practitioners and construction researchers. Social implications Given the amount of digitized services and tools used in the AEC industry, cybersecurity is increasingly becoming critical for society in general. In some cases, (e.g. critical infrastructure) incidents could have significant economic and societal or public safety implications. Therefore, proper consideration and action from the AEC research community and industry are needed. Originality/value To the authors' knowledge, this is the first attempt to measure and assess the cybersecurity of individual participants and the construction network as a whole by using the Common Vulnerability Scoring System.
引用
收藏
页码:3078 / 3105
页数:28
相关论文
共 50 条
  • [1] Vulnerability Assessment of Cybersecurity for SCADA Systems
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Manimaran, Govindarasu
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2008, 23 (04) : 1836 - 1846
  • [2] Cybersecurity of SCADA Systems: Vulnerability Assessment and Mitigation
    Liu, Chen-Ching
    Ten, Chee-Wooi
    Govindarasu, Manimaran
    2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION, VOLS 1-3, 2009, : 808 - +
  • [3] Cybersecurity knowledge graphs construction and quality assessment
    Hongyi Li
    Ze Shi
    Chengwei Pan
    Di Zhao
    Nan Sun
    Complex & Intelligent Systems, 2024, 10 : 1201 - 1217
  • [4] Cybersecurity knowledge graphs construction and quality assessment
    Li, Hongyi
    Shi, Ze
    Pan, Chengwei
    Zhao, Di
    Sun, Nan
    COMPLEX & INTELLIGENT SYSTEMS, 2024, 10 (01) : 1201 - 1217
  • [5] The inhospitable vulnerability: A need for cybersecurity risk assessment in the hospitality industry
    Chen, Hsiangting Shatina
    Fiscus, Joseph
    JOURNAL OF HOSPITALITY AND TOURISM TECHNOLOGY, 2018, 9 (02) : 223 - 234
  • [6] Challenges and vulnerability assessment of cybersecurity in IoT-enabled SC
    Raheema, Alaa Q.
    WIRELESS NETWORKS, 2024, 30 (08) : 6887 - 6900
  • [7] Cybersecurity of wearable devices: an experimental analysis and a vulnerability assessment method
    Langone, Matteo
    Setola, Roberto
    Lopez, Javier
    2017 IEEE 41ST ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC), VOL 2, 2017, : 304 - 309
  • [8] Vulnerability assessment of cybersecurity for SCADA systems using attack trees
    Ten, Chee-Wooi
    Liu, Chen-Ching
    Govindarasu, Manimaran
    2007 IEEE POWER ENGINEERING SOCIETY GENERAL MEETING, VOLS 1-10, 2007, : 2527 - +
  • [9] Automotive Cybersecurity Vulnerability Assessment Using the Common Vulnerability Scoring System and Bayesian Network Model
    Wang, Yinghui
    Yu, Bin
    Yu, Haiyang
    Xiao, Lingyun
    Ji, Haojie
    Zhao, Yanan
    IEEE SYSTEMS JOURNAL, 2023, 17 (02): : 2880 - 2891
  • [10] Vulnerability assessment in wireless networks
    Henning, RR
    2003 SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2003, : 358 - 362