Cyber-Attacks Risk Analysis Method for Different Levels of Automation of Mining Processes in Mines Based on Fuzzy Theory Use
Autor: | Mateusz Góralczyk, Adam Wróblewski, Bartłomiej Ziętek, Agnieszka Tubis, Sylwia Werbińska-Wojciechowska |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2020 |
Předmět: |
Risk analysis
mining sector cybersecurity Computer science risk analysis 020209 energy fuzzy theory 02 engineering and technology lcsh:Chemical technology Biochemistry Fuzzy logic Article Analytical Chemistry Risk analysis (business) 0202 electrical engineering electronic engineering information engineering lcsh:TP1-1185 Electrical and Electronic Engineering Instrumentation business.industry Automation Atomic and Molecular Physics and Optics Mining industry Identification (information) Factory 4.0 mines automation level Risk analysis (engineering) mining machinery 020201 artificial intelligence & image processing Risk assessment business |
Zdroj: | Sensors Volume 20 Issue 24 Sensors (Basel, Switzerland) Sensors, Vol 20, Iss 7210, p 7210 (2020) |
ISSN: | 1424-8220 |
DOI: | 10.3390/s20247210 |
Popis: | The rising automation level and development of the Industry 4.0 concept in the mining sector increase the risk of cyber-attacks. As a result, this article focuses on developing a risk analysis method that integrates Kaplan&rsquo s and Garrick&rsquo s approach and fuzzy theory. The proposed approach takes into account the level of automation of the operating mining processes. Moreover, it follows five main steps, including identifying the automation level in a selected mine, definition of cyber-attack targets, identification of cyber-attack techniques, definition of cyber-attack consequences, and risk ratio assessment. The proposed risk assessment procedure was performed according to three cyber-attack targets (databases, internal networks, machinery) and seven selected types of cyber-attack techniques. The fuzzy theory is implemented in risk parameter estimation for cyber-attack scenario occurrence in the mining industry. To illustrate the given method&rsquo s applicability, seven scenarios for three levels of mine automation are analyzed. The proposed method may be used to reveal the current cybersecurity status of the mine. Moreover, it will be a valuable guide for mines in which automation is planned in the near future. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |