Evolution and Trends of Industrial Control System Cyber Incidents since 2017

6Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The industrial control systems (ICSs) that manage our critical infrastructure are increasingly converging with corporate networks and the Internet as technology and businesses prioritize digital connectivity. These connections make them more vulnerable and available to malicious cyber actors who traditionally targeted the companies’ more public-facing information technology (IT) net-works. This paper will review select publicly reported cyber incidents to highlight the continued and growing threat to ICS devices and operational technology (OT) environments. It will summarize the incident and when available, will provide information on the cyber actors, the vulnerabilities they exploited, and any publica-tions the U.S. Government (USG) provided in response. Data be-longing to the Department of Homeland Security (DHS) will be used to highlight quantitative trends concerning ICS incidents. This paper builds on “History of Industrial Control System Cyber Incidents” (Hemsley & Fisher 2018), a paper that highlighted select noteworthy threats and incidents to ICS systems up to 2017. This paper will similarly review select incidents occurring after the last previously reviewed incident, Triton/HatMan, December 2017, and will note ICS incident trends including IT/OT convergence and advances in cyber-threat actors’ capabilities in observed in the examined incidents.

Cite

CITATION STYLE

APA

Grubbs, R., Stoddard, J., Freeman, S., & Fisher, R. (2021). Evolution and Trends of Industrial Control System Cyber Incidents since 2017. Journal of Critical Infrastructure Policy, 2(2), 45–79. https://doi.org/10.18278/jcip.2.2.4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free