Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment
Simola, J., Savola, R., Frantti, T., Takala, A., & Lehkonen, R. (2023). Developing Cybersecurity in an Industrial Environment by Using a Testbed Environment. In A. Andreatos, & C. Douligeris (Eds.), Proceedings of the 22nd European Conference on Cyber Warfare and Security (pp. 429-438). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security, 22. https://doi.org/10.34190/eccws.22.1.1362
DisciplineTutkintokoulutusSecure Communications Engineering and Signal ProcessingTietojärjestelmätiedeDegree EducationSecure Communications Engineering and Signal ProcessingInformation Systems Science
© 2023 European Conference on Cyber Warfare and Security
Critical infrastructure protection requires a testing environment that allows the testing of different kinds of equipment, software, networks, and tools to develop vital functions of the critical industrial environment. Used electrical equipment must be reliable, capable and maintain a stable critical industrial ecosystem. An industrial business needs to develop cybersecurity capabilities that detect and prevent IT/ICT and OT/ICS threats in an industrial environment. The emerging trend has been to create security operations center (SOC) services to detect ICS-related threats in enterprise networks. The energy supply sector must consist of crucial elements for safe business continuity and supply chain management in the industrial sector. Threats have changed into a combination of threat types. Hybrid threats may prevent everyday industrial activities, processes, and procedures so that supply chain problems may become long-lasting and affects business continuity management. The project CSG belongs to the (Cybersecurity governance of operational technology in the sector connected smart energy) research project consortium of Business Finland’s Digital Trust Programme. The first research paper regarding the CSG (Cyber Security Governance) project concentrates on the applied theory background of this project. The research provides a research approach for investigating cyber security at the operational and technical levels. It answers the questions of where to concentrate on OT-related cyber security research and how we aim to deploy a testbed to develop a governance model in the CSG project. The study's primary purpose is to describe the operating OT-SOC environment and analyze system requirements for optimizing situational awareness in the testbed environment. ...
PublisherAcademic Conferences International
Parent publication ISBN978-1-914587-69-6
ConferenceEuropean Conference on Cyber Warfare and Security
Is part of publicationProceedings of the 22nd European Conference on Cyber Warfare and Security
Publication in research information system
MetadataShow full item record
Showing items with similar title or keywords.
Salmenpää, Tomi (Springer, 2022)This chapter focuses mainly to proactive means in information security and more specifically governance of information security in civil aviation. The reason is that, to find sustainable, coherent and holistic way to ...
Information Security Risk Assessments following Cybersecurity Breaches : The Mediating Role of Top Management Attention to Cybersecurity Shaikh, Faheem Ahmed; Siponen, Mikko (Elsevier, 2023)Information Systems (IS) research on managerial response to cybersecurity breaches has largely focused on externally oriented actions such as customer redressal and crisis response. Within the firm itself, a breach may be ...
Aaltola, Kirsi; Ruoslahti, Harri; Heinonen, Jarmo (Academic Conferences International Ltd, 2022)Key personnel and their competences play important roles in continuity management and improving resilience of cybersecurity in organizations. Researchers have addressed many topics and studies in the cybersecurity domain. ...
Kuusisto, Rauno; Kuusisto, Tuija (Peregrine Technical Solutions, LLC, 2013)The purpose of this paper is to form a preliminary hypothesis about how to identify characteristics that a leader needs to focus on when aiming at cyber-security leadership. The paper studies the key concepts and terms of ...
Understanding Crowdturfing : The Different Ethical Logics Behind the Clandestine Industry of Deception Rinta-Kahila, Tapani; Soliman, Wael (European Conference on Information Systems, 2017)Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represents a form of cyber-deception in which workers are paid to express a false digital impression. While such behavior may not be punishable under ...