Cargando…
Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into a...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766562/ https://www.ncbi.nlm.nih.gov/pubmed/33339301 http://dx.doi.org/10.3390/s20247210 |
_version_ | 1783628748235472896 |
---|---|
author | Tubis, Agnieszka A. Werbińska-Wojciechowska, Sylwia Góralczyk, Mateusz Wróblewski, Adam Ziętek, Bartłomiej |
author_facet | Tubis, Agnieszka A. Werbińska-Wojciechowska, Sylwia Góralczyk, Mateusz Wróblewski, Adam Ziętek, Bartłomiej |
author_sort | Tubis, Agnieszka A. |
collection | PubMed |
description | The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method’s applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future. |
format | Online Article Text |
id | pubmed-7766562 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-77665622020-12-28 Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use Tubis, Agnieszka A. Werbińska-Wojciechowska, Sylwia Góralczyk, Mateusz Wróblewski, Adam Ziętek, Bartłomiej Sensors (Basel) Article The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan’s and Garrick’s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method’s applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future. MDPI 2020-12-16 /pmc/articles/PMC7766562/ /pubmed/33339301 http://dx.doi.org/10.3390/s20247210 Text en © 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Tubis, Agnieszka A. Werbińska-Wojciechowska, Sylwia Góralczyk, Mateusz Wróblewski, Adam Ziętek, Bartłomiej Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title | Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title_full | Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title_fullStr | Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title_full_unstemmed | Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title_short | Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use |
title_sort | cyber-attacks risk analysis method for different levels of automation of mining processes in mines based on fuzzy theory use |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7766562/ https://www.ncbi.nlm.nih.gov/pubmed/33339301 http://dx.doi.org/10.3390/s20247210 |
work_keys_str_mv | AT tubisagnieszkaa cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse AT werbinskawojciechowskasylwia cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse AT goralczykmateusz cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse AT wroblewskiadam cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse AT zietekbartłomiej cyberattacksriskanalysismethodfordifferentlevelsofautomationofminingprocessesinminesbasedonfuzzytheoryuse |