Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems

Abstract

Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices to solve a real-world problem. Towards industry 4.0 revolution, Cyber-Physical Systems currently become one of the main targets of hackers and any damage to them lead to high losses to a nation. According to valid resources, several cases reported involved security breaches on Cyber-Physical Systems. Understanding fundamental and theoretical concept of security in the digital world was discussed worldwide. Yet, security cases in regard to the cyber-physical system are still remaining less explored. In addition, limited tools were introduced to overcome security problems in Cyber-Physical System. To improve understanding and introduce a lot more security solutions for the cyber-physical system, the study on this matter is highly on demand. In this paper, we investigate the current threats on Cyber-Physical Systems and propose a classification and matrix for these threats, and conduct a simple statistical analysis of the collected data using a quantitative approach. We confirmed four components i.e., (the type of attack, impact, intention and incident categories) main contributor to threat taxonomy of Cyber-Physical Systems.

Authors and Affiliations

Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Warusia Yassin, Aslinda Hassan, Zaheera Zainal Abidin, Nabeel Salih Ali, Karrar Hameed Abdulkareem

Keywords

Related Articles

Negotiation as a Collaborative Tool for Determining Permissions and Detection of Malicious Applications

In Android OS users find it very difficult to understand and comprehend its permission mechanism. Frequently, users tend to ignore permission negotiations dialogs during installation of an application. Users, who pay att...

Multiobjective Optimization for the Forecasting Models on the Base of the Strictly Binary Trees

The optimization problem dealing with the development of the forecasting models on the base of strictly binary trees has been considered. The aim of paper is the comparative analysis of two optimization variants which ar...

Data Flows Management and Control in Computer Networks

In computer networks, loss of data packets is inevitable, because of the buffer memory overflow of at least one of the nodes located on the path from the source to the receiver, including the latter. Such losses associat...

An Integrated Architectural Clock Implemented Memory Design Analysis

Recently Low power consumption and Custom Memory design is major issue for embedded designer. Micro wind and Xilinx simulator implements SRAM design architecture and performs efficient simulation. These simulators implem...

Stylometric Techniques for Multiple Author Clustering

In 1598-99 printer, William Jaggard named Shakespeare as the sole author of The Passionate Pilgrim even though Jaggard chose a number of non-Shakespearian poems in the volume. Using a neurolinguistics approach to authors...

Download PDF file
  • EP ID EP262019
  • DOI 10.14569/IJACSA.2018.090169
  • Views 94
  • Downloads 0

How To Cite

Mohammed Nasser Al-Mhiqani, Rabiah Ahmad, Warusia Yassin, Aslinda Hassan, Zaheera Zainal Abidin, Nabeel Salih Ali, Karrar Hameed Abdulkareem (2018). Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems. International Journal of Advanced Computer Science & Applications, 9(1), 499-508. https://europub.co.uk/articles/-A-262019