Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ TECHNICAL SCIENCES A...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

Systematization of approaches to the information security risk assessment of transportation and logistics centers

Systematization of approaches to the information security risk assessment of transportation and logistics centers

Abstract

Relevance of the study is driven by significant and constant growth of cyber threats to critical infrastructure, in particular to transport and logistics centers (TLCs), which are key nodes in global supply chains. Attacks on TLCs lead to serious conse-quences, namely: financial losses, disruption of logistics, and data compromise. This creates urgent need for effective ap-proaches to information security (IS) risk management adapted to the specifics of the TLC. Existing methods for assessing IS risks do not sufficiently take into account unique operational processes, integrated IT and OT systems, and technological landscape of TLCs, which jeopardizes their sustainability.The main problem addressed in this study is fragmentation of knowledge and insufficient adaptation of existing IS risk assessment methodologies to the specific conditions of TLCs. General approaches do not take into account unique attack vectors (via WMS, TMS), specific IT/OT vulnerabilities (SCADA), and cascading effects on physical operations. This mismatch makes it difficult to build effective cyber defense, which is critical for the sustainability of operations and data protection.The purpose of the article is to comprehensively systematize existing approaches to assessing IS risks, identify their advantages/disadvantages, and determine their relevance to TLCs.The study analyzed scientific works, standards and practices, which confirmed insufficient coverage of the specifics of TLCs' IS. The categories of security risks for TLCs are systematized. Risk assessment methodologies (FAIR, EBIOS, NIST, ISO/IEC 27005:2023, etc.) are classified and compared, their suitability for TLC is assessed, and advantages, disadvantages, and difficulties of adaptation are identified. The use of the combined, multi-level approach to selection of methods is proposed.The scientific novelty lies in development of classification and systematization of modern methods of assessing IS risks for TLC, as well as in the analysis of relationships between risk assessment methods, attack detection methods and approaches to their implementation in the context of TLC. This forms the knowledge base for making informed decisions by the TLC management on IS management. Practical value is possibility of improving the cybersecurity of TLCs through implementation of the recommended combined approach. At the same time, limitations of existing methods have been identified, including: fragmentation, insufficient consideration of the specifics of TLCs (especially IT/OT convergence) and potential resource intensity.Conclusions confirm achievement of the goal and substantiate urgent need for further research to develop the integrated, specialized methodology for assessing IS risks specifically for TLCs.

Зростання кіберзагроз для транспортно-логістичних центрів (ТЛЦ) вимагає адаптованих підходів до управ-ління ризиками інформаційної безпеки (ІБ). Існуючі методики оцінки ризиків ІБ недостатньо враховують специфіку ТЛЦ (інтеграція IT/OT, унікальні вектори атак та ін.).Метою статті є систематизація наявних підходів до оцінки ризиків ІБ та визначення їхньої придатності для ризиків інформаційної системи (ІС) ТЛЦ.На основі аналізу специфіки функціонування ТЛЦ (інтеграція IT/OT, критичність ланцюгів постачання, підвищені ри-зики воєнного часу) та огляду існуючих досліджень і стандартів, було: ідентифіковано та класифіковано основні категорії ризиків ІБ, характерні для ТЛЦ; проаналізовано поширені методики та стандарти оцінки ризиків ІБ (ISO 2700x, NIST, CORAS, HAZOP, OWASP, FAIR, FMEA, EBIOS та ін.); обґрунтовано доцільність застосування комбінованого, диференці-йованого підходу до оцінки ризиків, що поєднує використання комплексних фреймворків (NIST, ISO) із застосуванням спеці-алізованих методик для окремих напрямків діяльності ТЛЦ; представлено структуровані рекомендації щодо вибору мето-дик оцінки ризиків ІБ відповідно до специфіки ключових функціональних напрямків ТЛЦ.У результаті дослідження виявлено фрагментарність та недостатню специфічність існуючих рішень. Обґрун-товано гостру потребу розробки інтегрованої, спеціалізованої методики оцінки ризиків ІБ саме для ТЛЦ.

Keywords

information security risk; transport and logistics center; risk assessment; risk assessment methodology; critical infrastructure, ризик інформаційної безпеки; транспортно-логістичний центр; оцінка ризиків; методика оцінки ризиків; критична інфраструктура

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    0
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
0
Average
Average
Average
gold