Predicting Cyber-Attack using Cyber Situational Awareness: The Case of Independent Power Producers (IPPs)

被引:1
作者
Matey, Akwetey Henry [1 ]
Danquah, Paul [2 ]
Koi-Akrofi, Godfred Yaw [1 ]
机构
[1] Univ Profess Studies, Dept IT Studies, Accra UPSA, Madina, Ghana
[2] Heritage Christian Coll, Dept IT, Accra, Ghana
关键词
Internet of things; cyber situational awareness; critical infrastructures; power generation; cyber-attack; cyber security; human behavioural and independent power producers; PLS-SEM; VALIDITY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The increasing critical dependencies on Internetof-Things (IoT) have raised security concerns; its application on the critical infrastructures (CIs) for power generation has come under massive cyber-attack over the years. Prior research efforts to understand cybersecurity from Cyber Situational Awareness (CSA) perspective fail to critically consider the various Cyber Situational Awareness (CSA) security vulnerabilities from a human behavioural perspective in line with the CI. This study evaluates CSA elements to predict cyber-attacks in the power generation sector. Data for this research article was collected from IPPs using the survey method. The analysis method was employed through Partial Least Squares Structural Equation Modeling (PLS-SEM) to assess the proposed model. The results revealed negative effects on people and cyber-attack, but significant in predicting cyber-attacks. The study also indicated that information handling is significant and positively influences cyber-attack. The study also reveals no mediation effect between the association of People and Attack and Information and Attack. It could result from an effective cyber security control implemented by the IPPs. Finally, the study also shows no sign of network infrastructure cyber-attack predictions. The reasons could be because managers of IPPs had adequate access policies and security measures in place.
引用
收藏
页码:700 / 709
页数:10
相关论文
共 65 条
[1]  
Akhtar T, 2018, P IEEE INT C CONSUME
[2]  
[Anonymous], 2017, ADB sustainable development working paper series
[3]   Modelling Load-Changing Attacks in Cyber-Physical Systems [J].
Arnaboldi, Luca ;
Czekster, Ricardo M. ;
Morisset, Charles ;
Metere, Roberto .
ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2020, 353 :39-60
[4]  
Bradley P., 2016, CYBER SECURE REV
[5]   Ransomware threat and its impact on SCADA [J].
Butt, Usman Javed ;
Abbod, Maysam ;
Lors, Anzor ;
Jahankhani, Hamid ;
Jamal, Arshad ;
Kumar, Arvind .
PROCEEDINGS OF 2019 IEEE 12TH INTERNATIONAL CONFERENCE ON GLOBAL SECURITY, SAFETY AND SUSTAINABILITY (ICGS3-2019), 2019, :166-173
[6]  
Campbell R. J, 2018, C RES SERV
[7]  
Chin WW, 1998, QUANT METH SER, P295
[8]  
Creasey J. C, 2013, P 8 IET INT SYST SAF, V2013, P1, DOI 10.1049/cp.2013.1708
[9]   Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning [J].
Das, Mohammad Ashrafuzzaman ;
Das, Saikat ;
Chakhchoukh, Yacine ;
Shiva, Sajjan ;
Sheldon, Frederick T. .
COMPUTERS & SECURITY, 2020, 97 (97)
[10]  
Eckhart M, 2019, IEEE INT C EMERG, P1222, DOI [10.1109/etfa.2019.8869197, 10.1109/ETFA.2019.8869197]