Cybersecurity in The Context of Industry 4
Cybersecurity in The Context of Industry 4
Computers in Industry
journal homepage: www.elsevier.com/locate/compind
a r t i c l e i n f o a b s t r a c t
Article history: An increasing number of cybersecurity breaches adversely affect business performance, by leveraging the
Received 14 June 2019 vulnerabilities of networked manufacturing machines. In some cases, cyber-attacks on critical industrial
Received in revised form 7 October 2019 equipment are able to undermine the corporate business model. Knowing and evaluating in advance the
Accepted 9 November 2019
main critical assets to be protected from potential cyber-attacks and the business impacts that could
Available online 16 November 2019
occur is a source of competitive advantage.
Through the analysis of literature and an ethnographic research approach, this study proposes a struc-
Keywords:
tured classification of critical industrial assets within Industry 4.0 and potential adverse impacts on
Industry 4.0
Networked manufacturing
business performance due to breaches of cybersecurity. In particular, cybersecurity is analysed in terms
Cyber-attack of loss of confidentiality, integrity and availability of data associated with networked manufacturing
Cybersecurity breach machines. It is also suggested how critical assets and business impacts are correlated and how business
Business impact impacts can be assessed. The proposed results can be organized in four steps for supporting companies
in making decisions on cybersecurity policies. Moreover, both industry and academia can benefit from
these results to conduct future analysis and investigation activities in the field of cybersecurity.
© 2019 Elsevier B.V. All rights reserved.
Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. State of the art . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1. Cybersecurity in industry 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2. Standards and guidance documents for cybersecurity in Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3. Methodological solutions for cybersecurity in Industry 4.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Research design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Research aim . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2. Research method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3.3. Ethnographic context . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.1. Critical assets analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.1.1. Data categories identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.2. Business impacts analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.2.1. Assessment methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.3. Impact matrix definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.3.1. Loss of data confidentiality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.3.2. Loss of data integrity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.3.3. Loss of data availability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
∗ Corresponding author.
E-mail address: [email protected] (M. Lezzi).
https://doi.org/10.1016/j.compind.2019.103165
0166-3615/© 2019 Elsevier B.V. All rights reserved.
2 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
4.4.
Business impact level assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.4.1. Quantitative method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.4.2. Qualitative method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.4.3. Example of application in a hypothetical scenario. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12
5. Discussion for future analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
6. Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Declaration of competing interest . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
(Behrendt et al., 2017). In particular, Industry 4.0 performance (ISA, 2016). In particular, the objective of the application of these
improvements are achieved by (i) maximizing asset utilization and standards is to improve the safety, availability, integrity and con-
minimizing machine downtime through remote monitoring and fidentiality of components of Industrial Automation and Control
predictive maintenance, (ii) increasing labour productivity thanks Systems and to provide criteria for the procurement and imple-
to manual labour automation, (iii) reducing inventory levels and mentation of secure industrial automation and control systems. In
improving the quality of services and products by leveraging anal- this way, compliance with the requirements of the 62443 series
ysis of data produced in real-time by machine sensors. can lead companies to improve electronic security and identify
However, the presence of connected Cyber-Physical Systems in and address vulnerabilities, reducing the risk of compromising
industrial environments poses a considerable security challenge confidential information or causing degradation or failure of the
since most systems of this type were not designed with cybersecu- equipment or processes under control.
rity in mind (Tuptuk and Hailes, 2018). On the other hand, the IACS Cybersecurity Certification
In the past, the manufacturing systems were closed and secu- Framework (ICCF) (Theron and Lazari, 2018) proposes four
rity was ensured by their isolation and physical access control. IACS cybersecurity certification schemes (i.e., self-declaration of
Today, on the contrary, modern manufacturing machines are compliance, independent compliance assessment, product cyber
equipped with a number of smart devices (e.g., sensors and actua- resilience certification and full cyber resilience certification), which
tors) and are connected via wireless networks or wired Ethernet involve three different evaluation activities such as compliance
to other machines and data processing systems. Manufacturing assessment, cyber resilience testing and development process eval-
components communicate over private industrial networks using uation. The objective of the ICCF is to encourage the provision
specific protocols, but these do not provide adequate protec- of certified components in order to improve the in-depth cyber-
tion against cyber-threats (European Union Agency for Networked defence of the IACS.
and Information Security (ENISA), 2018). Such insecure network Moreover, the French Network and Information Security
connections make manufacturing systems vulnerable to an increas- Agency, the ANSII, published some guides (ANSSI, 2012; ANSSI,
ingly number of cyber-attacks (Wu et al., 2018), so that the data 2014a; ANSSI, 2014b) about cybersecurity for Industrial Control
associated with these systems can be accessed by unauthorized Systems. These guides play a key role in helping all industry stake-
users. holders to consider cybersecurity issues. The ANSII assumption is
According to the study conducted by the European Network and that cybersecurity in industry means analysing system vulnerabil-
Information Security Agency (ENISA) (European Union Agency for ities (hardware, software, procedures and human factors) in order
Networked and Information Security (ENISA), 2018), the most crit- to implement measures to safeguard the continuity of core business
ical assets in terms of cybersecurity in Industry 4.0 are Industrial functions.
Control Systems (ICS), followed by Industrial Internet of Things Although API Standard 1164 (American Petroleum Institute
(IIoT) gateways, and sensors and actuators. (API), 2016) offers guidance to operators of oil and liquid gas
In particular, Industrial Control Systems ensure the automatic pipeline systems to improve SCADA cybersecurity, the use of this
operation of technical industrial facilities, controlling and monitor- standard is not limited to pipelines. As an evidence, the stan-
ing business processes. These systems include Supervisory Control dard analyses the vulnerabilities of the SCADA systems that can be
and Data Acquisition (SCADA) systems and Distributed Control Sys- exploited by unauthorized entities and defines the processes to be
tems (DCS), the core components of which are the Programmable implemented in the company to achieve this goal; it also provides
Logic Controller (PLC), Remote Terminal Unit (RTU), Intelligent a list of practices to harden the system architecture and examples
Electronic Device (IED) and the interface technologies (Sullivan of industry best practices.
et al., 2016). IIoT gateways manage multiple communication tech- The Industrial Control System (ICS) Security Compendium
nologies (wired and wireless) using different protocols, as well as (Bundesamt für Sicherheit in der Informationstechnik (BSI), 2013),
performing advanced data analysis (e.g., machine learning algo- proposed by the German Federal Office for Information Security
rithms and big data analysis) and real-time controls on the system (Bundesamt fv̈r Sicherheit in der Informationstechnik - BSI), provides
by leveraging connected sensors and actuators. At last, sensors and a set of architectural, technical and organisational best practices for
actuators are IIoT devices that respectively measure system param- owners of ICS assets on: security-specific processes and policies;
eters (e.g., temperature, vibrations, motion, and so on) and execute selection of systems and components, as well as service providers
specific actions on it. and integrators; constructional and physical securing; and techni-
cal measures. Moreover, the ICS Security Compendium describes a
2.2. Standards and guidance documents for cybersecurity in methodology for auditing the ICS, although it does not define any
Industry 4.0 evaluation scheme.
At the same way, the Catalog of Control Systems Security (U.S.
In the context of Industry 4.0, cybersecurity standards and guid- Department of Homeland Security, 2011) collects a large sampling
ance documents help companies create a common understanding of recommendations and guidelines to increase the security of con-
of industry security controls and methods for assessing the effec- trol systems from physical and cyber-attacks. The catalogue does
tiveness of such controls. Over the last decade, bodies such as the not refer to a specific industry, but provides a master list of refer-
European Cyber Security Organization (ESCO) and the European ence information to be used for the revision and development of
Network and Information Security Agency (ENISA) have gathered standards for any control system.
existing standards and guidelines, as well as best practices and Furthermore, the Industrial Control Systems Cyber Emergency
procedures to address cybersecurity issues in relation to indus- Response Team (ICS-CERT) conducts security assessments with ref-
trial systems (European Network and Information Security Agency erence to critical infrastructure and provides options in view of
(ENISA), 2011; E.C.S. Organisation, 2017). Some of the most rele- mitigating and managing cybersecurity risks. In particular, the ICS-
vant standards and specifications are described below. These can CERT Assessments (Industrial Control Systems Cyber Emergency
be adopted in the Industry 4.0 era to assess the general cyberse- Response Team (2016)) are focused on design and network archi-
curity attitude of a system or organization. The main features are tecture areas. Such assessments provide stakeholders with the
shown in the following Table 1. understanding and context necessary to build effective defence-
The ISA/IEC 62443 series of standards addresses the issue of in-depth processes for enhancing cybersecurity.
security for Industrial Automation and Control Systems (IACS)
4 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
Table 1
Cybersecurity standards and guideline documents in Industry 4.0.
ISA/IEC 62443 Industrial Automation and Standard; IACS safety, 2016 ISA (2016)
Control Systems (IACS) availability, integrity and
confidentiality; Electronic
security
IACS Cybersecurity Industrial Automation and Framework; Cybersecurity 2018 Theron and Lazari (2018)
Certification Framework Control Systems (IACS) certification schemes; IACS’
(ICCF) in-depth cyber defence
ANSSI Cybersecurity for Industrial Control Systems Guide; ICS cybersecurity; 2012 and 2014 ANSSI (2012); ANSSI
Industrial Control (ICS) System vulnerabilities; (2014a); ANSSI (2014b)
Systems Business function
continuity
API Standard 1164 Supervisory Control and Standard; Oil and liquid 2009 (Second Edition) American Petroleum
Data Acquisition (SCADA) gas pipeline; SCADA Institute (API) (2016)
cybersecurity; Best
practices
ICS Security Compendium Industrial Control Systems Compendium; ICS security; 2013 Bundesamt für Sicherheit
(ICS) Best practices; Audit in der Informationstechnik
methodology (BSI) (2013)
Catalog of Control Systems Control Systems of critical Catalogue; Guidelines; 2011 U.S. Department of
Security infrastructures and key Control Systems Homeland Security (2011)
resources cybersecurity
ICS-CERT Assessments Industrial Control Systems Assessment; ICS 2016 Industrial Control Systems
(ICS) cybersecurity risks; Critical Cyber Emergency Response
infrastructure Team (2016)
NIST 800-82 Industrial Control Systems Guide; ICS security 2015 Stouffer et al. (2015)
(ICS) program; NIST SP 800-53
security controls
Finally, the NIST 800-82 (Stouffer et al., 2015) gives a guide to the requires a high degree of automation): (1) Planning develop-
security of Industrial Control Systems by developing and deploying ment activities, based on user stories that rely on requirements
an ICS security program, integrating security into network archi- from customers and operations; (2) Developing and testing new
tectures, and implementing the security controls of the NIST SP service features; (3) Releasing and deploying new software ver-
800-53 (NIST, 2013). These security controls, targeted at organiza- sions/features; (4) Operating the service and related software
tions and information systems supporting the executive agencies, within the operational environment; (5) Monitoring effectiveness
include information security program management controls and and efficiency. In general, the DevOps approach has proved to be
privacy controls. an appropriate framework for improving the quality of software
throughout its lifecycle.
2.3. Methodological solutions for cybersecurity in Industry 4.0 On the other hand, with the aim to visually express security
risks of Industrial Control Systems, (Kobara (2016)) presents a new
The study of the literature has revealed the presence of a certain attack tree approach, in which the problem is shown as root and
number of methodological solutions that companies can adopt as its sources as leaves. The proposed attack tree also allows to rep-
a guide in dealing with cybersecurity issues in 4.0 industrial envi- resent the severity level of each stage (node), the transferability
ronments. In the following Table 2, an overview of the frameworks, from one stage to another, and the countermeasures with their
methodologies and approaches are collected and listed. effects.
In particular, the NIST framework (NIST, 2018) for improv- There are different methods of risk assessment and identifi-
ing critical infrastructure cybersecurity is aimed at managing the cation of potential threats to smart manufacturing systems (Wu
cybersecurity risks associated with Information Technology (IT), et al., 2018; Ren et al., 2017). For example, a typical risk assess-
Industrial Control Systems (ICS), Cyber-Physical Systems (CPS) and, ment method is the hierarchical model proposed by Zhu and
more generally, connected devices. The Framework includes five Basar (2011), which defines the boundaries of the system to assess
core functions (i.e., identification, protection, detection, response, the risks and identifies the potential vulnerabilities on six layers:
and recovery) to be implemented through a set of security controls; physical, control, communication, network, supervisory and man-
its objective is to support organizations by providing a common lan- agement.
guage for understanding, managing and expressing cybersecurity Radanliev et al. (2018a); Radanliev et al. (2018b) propose an
risk to internal and external stakeholders. impact assessment model for articulating possible impacts and cal-
Moreover, (Babiceanu and Seker (2017)) propose a framework culating the economic impact of Internet of Things (IoT) cyber risk.
for addressing systems cybersecurity and resilience for Software- In the proposed model, Monte Carlo simulation plays a key role in
Defined Networks-based (SDN-based) manufacturing applications. reducing the IoT cyber risk uncertainty and in enabling the approx-
This framework pays attention to the identification of the system, imation and estimation of the economic impact.
the definition of resilience objectives, the analysis of vulnerabili- Lastly, (Januario et al. (2016)) propose a methodology for
ties and the involvement of stakeholders, as important aspects to assessing vulnerabilities in the context of SCADA systems. The
be considered in order to maintain the manufacturing system in a methodology entails: (i) for each component, a complete network
required state of security. representation; (ii) for each subsystem, the definition of the func-
The DevOps approach (based on software development for tions and decomposition of the components in each subsystem that
information technology operations) enables, instead, new scenar- implements them; (iii) for each operation, the list of resources used
ios for monitoring industrial security (Jansen and Jeschke, 2018). and the operations that can affect them.
In particular, this approach consists of five steps (each of them
A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165 5
Table 2
Cybersecurity methodological solutions in Industry 4.0.
NIST Framework for Information Technology (IT), Framework; Critical 2018 NIST (2018)
Improving Critical Industrial Control Systems infrastructure cybersecurity;
Infrastructure (ICS), Cyber-Physical Systems Five core functions based
Cybersecurity (CPS) and any other connected
devices
Cybersecurity and Software-defined Framework; Manufacturing 2017 Babiceanu and Seker
resilience framework networking-based systems security; SDN-based (2017)
manufacturing applications
DevOps approach Cyber-Physical System (CPS), Approach; Industrial security 2018 Jansen and Jeschke (2018)
industrial automation monitoring; five step based
and control systems IACS
Attack tree approach Industrial Control System (ICS) Approach; ICS security risks; 2016 Kobara (2016)
Attack tree
Hierarchical model for risk Industrial Control System (ICS) Model; Risk assessment 2011 Zhu and Basar (2011)
assessment method; Smart manufacturing
systems; Six layers
vulnerabilities
Impact assessment model Internet of Things (IoT) devices Model; IoT cyber risk; 2018 Radanliev et al. (2018a),
economic risk assessment Radanliev et al.(2018b)
Vulnerability assessment Supervisory Control and Data Methodology; SCADA systems 2016 Januario et al. (2016)
methodology Acquisition (SCADA) system vulnerabilities
3. Research design Furthermore, with the aim to make this study strictly related
to industrial practice, ethnography has been used as research
3.1. Research aim method. Using field-notes, ethnography allows to collect evidence
and obtain results concerning the analysed context (Creswell and
A significant number of methodological solutions have already Creswell, 2018). Several studies (Butlewski et al., 2016; Blomberg
been developed in order to address cybersecurity issues in the et al., 2003; Mohedas et al., 2015; Kosaka, 2012) use ethnography
Industry 4.0. However, not much emphasis is placed on the analysis for supporting the activities of ideas definition, feedback collec-
of critical assets to protect against cyber-attacks and the result- tion and different alternatives evaluation for the design of products,
ing business impacts. On the other hand, this kind of analyses in services and methods. Through the application of ethnography, the
the context of networked manufacturing could play a strategic context awareness increases and the research results achieved have
role for companies to understand which industrial assets to invest a higher level of suitability for the context explored (Jones, 2006).
their efforts in terms of security, in what order of priority and to Therefore, the field-notes (Bryma and Bell, 2015) were collected
what extent. With the aim to support company management in by observing the operations of a manufacturing cell composed of
dealing with such cybersecurity issues, in this study the focus is CNC machines. In particular, field-notes were taken on the work-
on the assessment of the adverse business impacts resulting from cycles performed within the manufacturing cell and on the input
cybersecurity breaches to networked manufacturing machines. In and output data associated with the networked machine tools. The
particular, the following research questions are addressed: focus was on data flow generated by the machines, the security
issues to be managed and the technologies used. The field-notes
• RQ1. What are the critical assets that if affected by cyber threats were then re-read, coded and analysed in accordance with the pur-
poses of this study.
prevent the company from doing business?
• RQ2. What are the adverse business impacts due to cybersecurity In conclusion, on the basis of the evidence collected in the liter-
ature, the NIST guidelines and the ethnography research method,
breaches?
• RQ3. What is the relationship between essential assets and busi- a structured classification of critical assets to be protected from
cyber-attacks and their business impacts has been defined. More-
ness impacts?
• RQ4. How to evaluate the business impact level? over, the relationship between critical assets and business impact
was identified, as well as the methods of assessing business
impacts. The search schema, with the procedures and results, is
3.2. Research method shown in Fig. 1.
The analysis of the state of the art has highlighted the lack of 3.3. Ethnographic context
an impact assessment methodology focused on the deep under-
standing and measurement of the impacts’ value in the context The ethnographic observations took place during the second half
of Industry 4.0. The literature analysis suggested some areas of of year 2018, in conjunction with the activities of TOREADOR Euro-
action and a gap to be filled in order to support companies in the pean project1 and related industrial scenarios. The ethnography
implementation of proper measures on cybersecurity. context was that of manufacturing cells (see Fig. 2) of aeronautical
In order to satisfy the research aim and answer research ques- components, where there are a certain number of networked Com-
tions, the NIST 800-30 asset/impact-oriented approach (Ross, 2012) puter Numerical Control (CNC) machines equipped with sensors
has been considered as reference for addressing cybersecurity risks and actuators. In particular, CNC machine tools are connected in the
in 4.0 industrial contexts. The NIST’s approach has as starting point network through sensors that record in real time a large amount
for risks assessment the identification of assets affected by threat
events and the impacts that could occur, possibly using the results
of a mission or business impact analysis and identifying threat 1
For more information on TOREADOR project see http://www.toreador-project.
events that cause those impacts. eu/.
6 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
other hand, the machine working parameters and the status of its and D’Arcy, 2019). All that may cause the breach of commercial
components, as well as the workpiece properties are machine out- agreements with customers on delivery time, but also a quality
put data, which go from smart sensors (embedded on machine) to degradation of the workpieces for some types of manufacturing
a control system (such as a SCADA system). Finally, the corrective processes.
instruction on the machine setting parameters represent the feed-
back sent by the control system to the actuators installed on the 4.2.1. Assessment methods
machine. Business impacts can be classified as tangible or intangible if
In general, the input and output data flow associated with net- respectively they can be measured quantitatively (e.g., loss of rev-
worked manufacturing machines is a strategical knowledge to be enue) or cannot be measured in specific units of measurement
preserved from any cybersecurity breaches. but qualified (e.g., in terms of high, medium and low impacts)
(Stoneburmer et al., 2002).
4.2. Business impacts analysis In particular, tangible impacts are measured by evaluating the
costs to repair the system and correct problems when a cyber-
The adverse impact of a cybersecurity event can be described attack succeeds. For this reason, the theft of industrial trade secrets
in terms of loss or degradation of one or more of the following and intellectual property means to sustain financial penalties due
data security requirements: confidentiality, integrity and availabil- to the violation of data confidentiality agreements with industrial
ity (Stoneburmer et al., 2002). partners. On the other hand, the sabotage of the entire critical
In particular, confidentiality requirement refers to the protec- infrastructure or specific machines and components entails a sig-
tion of information from unauthorized disclosure. In the context of nificant expenditure for repairing the physical systems, greater
Industry 4.0, the business impact due to unauthorized disclosure production waste due to degradation of product quality and loss
of confidential manufacturing information entails the loss of trade of sales due to machine downtime. Furthermore, the company can
secrets and intellectual property. This could undermine the com- face in financial penalties caused by the violation of regulations and
pany’s competitive advantage as the sole data owner, damage the standards in the field of safety and pollution, and of commercial
company’s image and reputation, as well as entail financial penal- agreements with customers on product specifications. In addition,
ties for having breached commercial agreements in the field of data substantial financial penalties may be imposed on the company
confidentiality. In this context, the loss of competitive advantage when life-threatening situations for workers occur. Finally, denial
in favour of competitors means to lose strategical knowledge on of service of networks, system devices or any other computational
processes or products (Ahmad et al., 2014); while, image and rep- resource involves a series of costs for restoring the system func-
utation damages negatively impact on behaviour of stakeholder tionalities, higher inventory levels for raw materials (or supplies)
(customers, suppliers/contractors, investors and potential employ- and semi-finished goods, loss of sales due to machine downtime,
ees) (Gatzert, 2015). financial penalties for breaching of commercial agreements with
The integrity requirement, instead, refers to protect information customers on delivery time and greater production waste due to
from improper modification so that the trustworthiness of data and the quality degradation of the workpieces.
IT systems can be guaranteed. In Industry 4.0, when manufactur- In the case of non-tangible impacts, such as reduction of compet-
ing information is improperly manipulated, the business impact itive advantage and damage to the company image and reputation
results in the sabotage of the entire critical infrastructure or spe- due to the theft of intellectual property after a cyber-attack, a
cific machines and components. In this way, there could be a quality qualitative assessment can be made. This assessment concerns
degradation of products realized, damage to working machines the definition of the impacts magnitude according to the high,
and, more generally, a violation of standards and regulations in the medium and low three-dimensional scale. In particular, the loss
field of safety and pollution, as well as of commercial agreements of competitive advantage in favour of competitors means to eval-
with customers on product specifications. In the worst case, life- uate the impact magnitude for the loss of strategical knowledge
threatening situations for workers may occur (Tuptuk and Hailes, on manufacturing processes or products; while, image and rep-
2018). utation damages can be evaluated in terms of negative impact
Finally, the availability requirement guarantees that data are on behaviour of stakeholder (customers, suppliers/contractors,
accessible and usable on demand. If this security requirement is not investors or potential employees).
satisfied in Industry 4.0 environments, there is a denial of service of Based on the literature, the NIST guide and the ethnographic
networks, system devices or any other computational resource cor- observations, Table 3 provides an overview on the relationship
related to the manufacturing environment. This negatively affects between the loss or degradation of data and systems security
the business in terms of loss of system functionality and opera- requirements, the resulting business impacts and the methods to
tional effectiveness, that is to say loss of production time (Hovav assess them, in reference to Industry 4.0 contexts.
8 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
4.3. Impact matrix definition lation both of the standards and regulations in the field of safety
and pollution (until the occurrence of life-threating situations for
With the aim to relate the data categories (DC), identified in workers) and of the commercial agreements with customers on
4.1.1, with the loss of data security requirements, according to the product specifications. Thus, greater production waste (IC.2) and
different types of business impacts (BI) described in section 4.2, an sales losses (IC.3) will characterize the first scenario; while, addi-
impacts matrix is proposed (see Table 4). The matrix was populated tional financial penalties (IC.4) will be applied for violation of safety
as a result of ethnographic observations conducted in the indus- and pollution standards and regulations, or commercial agree-
trial scenario of reference. In particular, the assignment of specific ments.
business impacts to each data category is addressed to estimate Moreover, the loss of data integrity on the operations sequence
the business impacts level (in terms of Impact Magnitude - IM or (DC3) that the machine has to run in the work-cycle could damage
Impact Cost - IC). the working machine itself, or cause the violation of standards and
regulations in the field of safety and pollution, until create life-
4.3.1. Loss of data confidentiality threatening situations for workers. Therefore, it will be necessary
The loss of confidentiality of product design information (DC1) to repair the physical systems (IC.1) and make financial efforts (IC.4)
could affect the reduction of competitive advantage in favour of to compensate for the violation of standards and regulations and
competitors due to the loss of distinctive knowledge about the personal injury.
products and their making process (IM.1). At the same time, a dam- On the other hand, unauthorized modifications of data relating
age to company image and reputation (IM.2) could occur, so that to the machine working parameters (DC4) and the status of its com-
customers lose confidence in manufacturers and decide to change ponents (IC.5), as well as the workpieces’ properties (IC.6) do not
supplier. In fact, it is reasonable to think that customers do not want have significant business impacts. In fact, these are machine out-
information about their products to be detected in an unauthorized put data that provide an overview of the health status of the entire
manner. Finally, the company may also incur financial penalties manufacturing system and the quality of the products realized,
(IC.4) due to the violation of data confidentiality agreements with so that their alteration could only increase controls on machines
customers. and products before making other more impactful decisions on the
In the event of a loss of confidentiality of data relating to business.
the machine setting parameters (DC2) or the machine operations Finally, with regard to the loss of integrity of data relating
sequence (DC3), it is expected that no significant business impact to corrective instructions on machine setting parameters (IC.7),
will be observed. In fact, in the manufacturing industry, these data the situation is similar to that of DC2 where significant business
categories, if taken individually, do not represent strategical knowl- impacts could occur in terms of quality degradation of products,
edge (which could affect the company competitive advantage), and violation of standards and regulations in the field of safety and
their unauthorized disclosure does not have significant negative pollution, and commercial agreements with customers. Therefore,
impacts on the behaviour of stakeholders or financial penalties in manufacturers will incur greater production waste (IC.2) and sales
favour of industrial partners. losses (IC.3) due to the poor quality of products produced, as well
On the other hand, losing confidentiality of data related to the as financial penalties (IC.4) for having breached standards and reg-
machine working parameters (DC4) or the status of its components ulations, or commercial agreements on product specifications.
(DC5) could undermine the company image and reputation (IM.2)
since these data provide information on the health status of the
entire manufacturing system. Thus, if the machine malfunctions
were revealed, the company reliability would be compromised, 4.3.3. Loss of data availability
resulting in loss of customers and investors. The loss of availability of one or more categories of machine
The loss of confidentiality of data on the properties of work- input data, such as product design information (DC1), machine set-
pieces (DC6), as indicators of the product quality, could have a ting parameters (DC2) and operations sequence (DC3), could result
negative impact on the company competitive advantage in favour in loss of productive time, as all these data are necessary to start
of its competitors (IM.1). In fact, in case of product defects, com- and run the manufacturing process. Moreover, there may be a con-
petitors could take advantage of the situation, by adopting ad hoc sequent violation of commercial agreements with customers on
market strategies to gain a greater market share. product delivery time, as well as a quality degradation of work-
Finally, no significant business impact is expected to be observed pieces due to the manufacturing process interruption. Therefore, it
if there is a loss of confidentiality of data concerning corrective will be required time-and-money consuming activities to restore
instructions on machine setting parameters (DC7). As in the case the system functionalities (IC.5) and to deal with the increased
of data relating to machine setting parameters and operations inventory levels of raw materials (IC.6), which are waiting to be
sequence, also these data, if taken individually, do not represent processed. Moreover, costs for lost sales (IC.3) due to the block of
strategical knowledge such as to influence the company com- manufacturing operations, financial penalties (IC.4) for having vio-
petitive advantage, neither their disclosure can cause significant lated commercial agreements, and greater production waste (IC.2)
negative impacts on stakeholder behaviour or financial penalties in the event of quality degradation of workpieces will have to be
for the company. taken into account.
At the same way, by focusing on machine output data, such as
4.3.2. Loss of data integrity machine working parameters (DC4), machine components’ status
Concerning data integrity, unauthorized modification of prod- (DC5) and workpiece properties (DC6), and on machine correc-
uct design information (DC1) could lead to degradation of product tive instructions (DC7), their loss of availability could cause a loss
quality, as well as violation of commercial agreements with cus- of production time due to unexpected machine downtime. As a
tomers about product specifications. Consequently, in the first case, result, there may be a possible violation of commercial agreements
there will be increased production waste (IC.2) and sales losses with customers on delivery time. This depends on the fact that no
(IC.3) will occur; while, in the second case, the manufacturer will predictive maintenance activity on machines can be carried out.
incur financial penalties (IC.4). Therefore, manufacturers will incur financial efforts for restoring
The loss of integrity of data on the machine setting parameters system functionalities (IC.5), loss of sales (IC.3) and higher inven-
(DC2) could cause a quality degradation of the products and a vio- tory levels (IC.6) due to machines downtime, and non-compliance
A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165 9
Table 3
Security requirements, related business impacts and impacts assessment methods in I-4.0 contexts.
Confidentiality: BI.1. Theft of industrial trade secrets and intellectual Qualitative assessment of Impacts Magnitude (IM):
protection of information from property: IM.1. Loss of strategical knowledge on processes and
unauthorized disclosure BI.1.1 Reduction of company competitive advantage. products
BI.1.2 Damage to company image and reputation. IM.2.Negative impact on stakeholder behaviour
BI.1.3 Violation of commercial agreements with industrial Quantitative assessment of Impacts Cost (IC):
partners on data confidentiality. IC.4. Financial penalties
Integrity: BI.2. Sabotage of the entire critical infrastructure or Quantitative assessment of Impacts Cost (IC):
Protection of information from specific machines and components: IC.1. Repairing the physical systems
improper modification BI.2.1 Damages to working machines. IC.2. Higher production waste
BI.2.2 Quality degradation of products. IC.3. Lost sales
BI.2.3 Violation of standard and regulations in the field of IC.4. Financial penalties
safety and pollution.
BI.2.4 Violation of the commercial agreements with
customers on product specifications.
BI.2.5 Life-threatening situations for workers.
Availability: BI.3. Denial of service of networks, system devices or any Quantitative assessment of Impacts Cost (IC):
Protection of data in order to be other computational resource: IC.5. Restoring the system functionalities
accessible and usable on demand BI.3.1 Loss of productive time. IC.6. Higher inventory levels
BI.3.2 Violation of the commercial agreements with IC.3. Lost sales
customers on delivery time. IC.4. Financial penalties
BI.3.3 Quality degradation of the workpieces. IC.2. Higher production waste
with commercial agreements with customers on delivery time • IC.6. Higher inventory levels.
(IC.4).
For each of these impact costs, a classification of the main terms
4.4. Business impact level assessment associated with them is provided (see Table 5).
In particular, repairing the physical systems (IC.1) includes a set
Once the impact matrix has been defined, which provides an of direct costs related to the machine repairing, such as those of
overview of the business impacts associated with the loss of data removing broken parts, their disposal, the cost of spare parts, as
security requirements in the context of Industry 4.0, the level of well as the costs of installing and testing new parts. In other words,
such impacts needs to be assessed. In order to achieve this goal, these costs are calculated as the sum of costs of all spare parts and
the focus is on the matrix values definition (i.e., Impacts Cost and man-hours spent in replacement activities:
Impacts Magnitude).
According to the NIST’s Guide for Conducting Risk Assessments
n
(Ross, 2012), the level of impact of a threat event can be defined as IC.1. = (cr i + chi )
“the magnitude of harm that can be expected to result from the con- i=1
sequences of unauthorized disclosure of information, unauthorized
where, cr is the cost for the spare part, ch is the cost of the man-
modification of information, unauthorized destruction of informa-
hours used to replace the part (such as the sum of the time needed
tion, or loss of information or information system availability”.
to remove and dispose of the broken parts, install and test the new
Although the way to calculate the different business impacts can
ones); while, i represents the number of parts to be replaced in a
be formalized, the impacts level (i.e. the matrix values) depends
given timeframe.
on the company, and in particular on the type and complexity
Then, if the production waste, due to the quality degradation of
of the manufacturing processes and products realized, or on the
products or workpieces, is higher than the normal working condi-
market strategies adopted into the referring industry. Moreover, in
tions (IC.2), some additional costs must be considered relating to
line with the impact matrix, the values related to the impact costs
the scrap materials produced for each defective product and the
change according to the combination of the data category under
inventory need for defective products.
evaluation and the security requirements being breached (confi-
dentiality, integrity or availability). For instance, IC.4 in BI.2.4 will
n
be calculated using the same formula as IC.4 in BI.3.2 but will lead IC.2. = (cmj + cij )
to different results. j=1
In the following, the main points to focus on in order to esti-
mate the business impacts level are treated; they are based on In the IC.2 formula, cm is the cost of the scrap materials asso-
the quantitative and qualitative assessment methods introduced ciated with each product, ci is the cost for storing the defective
in sub-section 4.2.1. product; while, j represents the number of defective products real-
ized in a given timeframe.
4.4.1. Quantitative method On the other hand, loss of sales (IC.3) means taking into consid-
As emerged in 4.2.1, the quantitative method to be adopted for eration the costs associated with loss of profit for each product that
evaluating the business impacts level in the context of Industry 4.0 is not sold because of an interruption in production.
involves the assessment of the following impact costs:
n
IC.3. = cpk
• IC.1. Repairing the physical systems;
k=1
• IC.2. Higher production waste;
• IC.3. Lost sales; In this case, cp is the cost equal to the selling price of each prod-
• IC.4. Financial penalties; uct realized and k is the number of products realized in a given
• IC.5. Restoring the system functionalities; timeframe.
10 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
Table 4
Impacts matrix.
DC1 BI.1.1 Reduction of company BI.2.2 Quality degradation of products. BI.3.1 Loss of productive time.
Product design competitive advantage. IC.2. Higher production waste IC.5. Restoring the system functionalities
information IM.1. Loss of strategical IC.3. Lost sales IC.6. Higher inventory levels for raw materials
knowledge on products and BI.2.4 Violation of the commercial agreements (or supplies)
their making process. with customers on product specifications. IC.3. Lost sales
BI.1.2 Damage to company IC.4. Financial penalties BI.3.2 Violation of the commercial agreements
image and reputation. with customers on delivery time.
IM.2. Negative impact on IC.4. Financial penalties
customers’ behaviour. BI.3.3 Quality degradation of the workpieces.
BI.1.3 Violation of commercial IC.2. Higher production waste
agreements with customers on
data confidentiality
IC.4. Financial penalties
DC2 / BI.2.2 Quality degradation of products. BI.3.1 Loss of productive time.
Machine setting IC.2. Higher production waste IC.5. Restoring the system functionalities
parameters IC.3. Lost sales IC.6. Higher inventory levels for raw materials
BI.2.3 Violation of standard and regulations in (or supplies)
the field of safety and pollution. IC.3. Lost sales
IC 4. Financial penalties BI.3.2 Violation of the commercial agreements
BI.2.4 Violation of the commercial agreements with customers on delivery time.
with customers on product specifications. IC.4. Financial penalties
IC.4. Financial penalties BI.3.3 Quality degradation of the workpieces.
BI.2.5 Life-threatening situations for workers. IC.2. Higher production waste
IC.4. Financial penalties
DC3 / BI.2.1 Damages to working machines. BI.3.1 Loss of productive time.
Machine IC.1. Repairing the physical systems IC.5. Restoring the system functionalities
operations BI.2.3 Violation of standard and regulations in IC.6. Higher inventory levels for raw materials
sequence the field of safety and pollution. (or supplies)
IC.4. Financial penalties IC.3. Lost sales
BI.2.5 Life-threatening situations for workers. BI.3.2 Violation of the commercial agreements
IC.4. Financial penalties with customers on delivery time.
IC.4. Financial penalties
BI.3.3 Quality degradation of the workpieces.
IC.2. Higher production waste
DC4 BI.1.2 Damage to company / BI.3.1 Loss of productive time (no predictive
Machine working image and reputation. maintenance on machines)
parameters IM.2. Negative impact on IC.5. Restoring the system functionalities
customers and investors IC.6. Higher inventory levels for semi-finished
behaviour. goods
IC.3. Lost sales
BI.3.2 Violation of the commercial agreements
with customers on delivery time.
IC.4. Financial penalties
DC5 BI.1.2 Damage to company / BI.3.1 Loss of productive time (no predictive
Machine image and reputation. maintenance on machines)
components’ IM.2. Negative impact on IC.5. Restoring the system functionalities
status customers and investors IC.6. Higher inventory levels for semi-finished
behaviour. goods
IC.3. Lost sales
BI.3.2 Violation of the commercial agreements
with customers on delivery time.
IC.4. Financial penalties
DC6 BI.1.1 Reduction of company / BI.3.1 Loss of productive time (no predictive
Workpiece competitive advantage. maintenance on machines)
properties IM.1. Loss of strategical IC.5. Restoring the system functionalities
knowledge on products quality. IC.6. Higher inventory levels for semi-finished
goods
IC.3. Lost sales
BI.3.2 Violation of the commercial agreements
with customers on delivery time.
IC.4. Financial penalties
DC7 / BI.2.2 Quality degradation of products. BI.3.1 Loss of productive time (no predictive
Corrective IC.2. Higher production waste maintenance on machines)
instructions on IC.3. Lost sales IC.5. Restoring the system functionalities
machine setting BI.2.3 Violation of standard and regulations in IC.6. Higher inventory levels for semi-finished
parameters the field of safety and pollution. goods
IC 4. Financial penalties IC.3. Lost sales
BI.2.4 Violation of the commercial agreements BI.3.2 Violation of the commercial agreements
with customers on product specifications. with customers on delivery time.
IC.4. Financial penalties IC.4. Financial penalties
A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165 11
Table 5
Impact costs description.
Impact cost
Formula Description
n
IC 2. (Higher production waste) = (cmj + cij ) cm = cost of the scrap materials associated with each product
ci = cost of storage of the defective product
j=1
j = number of defective products realized
n
IC 4. (Financial penalties) = csl + caq cs = fees paid for having breached safety and pollution regulations
ca = fees paid for having breached agreements with customers
l=1 q=1
l = number of safety and pollution regulations breached
q = number of agreements with customers breached
IC 5. (Restoring the system functionalities) = cj + ce + co cj = cost of man-hours spent on restoring the system
ce = cost for the purchase of hardware and software
co = cost of training the staff and/or outsourcing of the system maintenance service
n
IC 6. (Higher inventory levels) = (cc + ct p + cd p ) cc = cost for the space required for the storage of the single component or semi-finished good
ct = cost for the transport and handling that component or semi-finished good
p=1
cd = cost of taking risks of deterioration and/or obsolescence of that component or
semi-finished good
p = number of surplus parts to be stored
With regard to the financial penalties (IC.4) imposed on compa- and to transport and handle it; while, cd is the cost for taking risks
nies for breaching safety and pollution regulations (until creating of deterioration and/or obsolescence of that component or semi-
life-threatening situations for workers), or for failing to comply finished good. In this case, p is the number of surplus parts to be
agreements with customers regarding data confidentiality, prod- stored, in a given timeframe.
uct specifications or delivery time, you can refer to the following
formula: 4.4.2. Qualitative method
n
m With the aim at qualitatively assessing the business impacts
IC.4. = csl + caq level in the context of Industry 4.0, the impacts magnitude has to
l=1 q=1 be considered with reference to:
where, cs and ca are respectively the fees paid by the company • IM 1. Loss of strategical knowledge on processes and products;
for breaching safety and pollution regulations, and agreements • IM 2. Negative impact on stakeholder behaviour.
with industrial partners; while, l is the number of safety and pollu-
tion regulations breached and q is the number of agreements with
partners not respected, in a given timeframe. It is necessary to underline that the impact magnitude depends
Moreover, the restoration of system functionalities (IC.5) on the specific data category.
includes the costs of man-hours used in the restoring tasks, and the In general, the impacts magnitude can be “low”, “medium” or
purchase of system hardware or software licenses (if necessary). “high”. The NIST’s Risk Management Guide for Information Tech-
Where advanced technical skills not available within the company nology Systems (Stoneburmer et al., 2002) provides the following
are required, additional costs for staff training and/or outsourcing description of the three main impact categories:
of the system maintenance service have to be taken into consider-
ation. • High level of impact: exercise of the vulnerability (1) may result
in the highly costly loss of major tangible assets or resources;
IC.5. = cj + ce + co (2) may significantly violate, harm, or impede an organization’s
mission, reputation, or interest; or (3) may result in human death
where, cj is the cost for the man-hours spent in the system restoring
or serious injury.
activities, ce is the cost for purchasing hardware and software, and • Medium level of impact: exercise of the vulnerability (1) may
co is the cost for the training of personnel and/or outsourcing of the
result in the costly loss of tangible assets or resources; (2) may
system maintenance service, in a given timeframe.
violate, harm, or impede an organization’s mission, reputation,
Finally, when inventory levels of raw materials (or supplies),
or interest; or (3) may result in human injury.
semi-finished goods are higher than expected (IC.6), some addi- • Low level of impact: exercise of the vulnerability (1) may result in
tional costs are incurred for the space needed to store surplus
the loss of some tangible assets or resources or (2) may noticeably
inventory, for transport and handling them, as well as for taking
affect an organization’s mission, reputation, or interest.
risks of deterioration and/or obsolescence of parts.
n
IC.6. = (cc p + ct p + cdp ) In this study, the expression “exercise of the vulnerability”
p=1 defines the condition for which one or more security requirements
The terms cc and ct are respectively the costs associated with (i.e., confidentiality, integrity, or availability) related to the specific
the space required to store each component (as surplus inventory) data category have been breached.
12 A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165
Table 6
Impact costs calculus for business impacts due to loss of availability.
Business impact: violation of the commercial agreements with customers on delivery time (BI.3.2)
Table 7
Impact costs calculus for business impacts due to loss of integrity.
Business impact: violation of standard and regulations in the field of safety and pollution (BI.2.3)
Table 8
Insights for steps accomplishment.
Type of analysis 1 – Results for industrial applications 2 - How they will be achieved
Step 1. Critical Assets Analysis Critical manufacturing data categories to be protected Focus groups
Step 2. Business Impact Analysis Business impacts to focus on Focus groups
Step 3. Impact Matrix Definition Business impacts associated with the specific data category On-line survey
Step 4. Business Impact Level Assessment Business impacts cost and magnitude estimates Semi-structured interviews
assessment proposed by Zhu and Basar (2011) details the bound- Declaration of competing interest
aries of the system to be protected based on six layers of analysis
(physical, control, communication, network, supervisory and man- None declared.
agement), but does not pay attention to the business impacts
related to the cybersecurity breach of each layer. In the same
way, the framework proposed by Babiceanu and Seker (2017) for References
addressing systems’ cybersecurity and resilience focuses on system
identification, resilience objective setting, vulnerability analysis, MForesight, Computing Community Consortium (CCC), 2017. Cybersecurity for
and stakeholder engagement, but does not analyse the business Manufacturers: Securing the Digitized and Connected Factory. Thomas Mahoney
- MForesight.
impacts of cyber-attacks.
Cisco, 2017. “Cisco 2017 Midyear Cybersecurity Report,” Cisco and/or Its Affiliates.
Instead, the impact assessment model of (Radanliev et al. EEF (The Manufactureres’ Organisation), 2018. Cyber Security for Manufacturing.
(2018a); Radanliev et al. (2018b)) calculates the economic impact EEF.
Ponemon Institute LLC (jointly developed by Accenture), 2017. “2017 Cost of Cyber
of the Internet of Things (IoT) cyber risk, but does not correlate
Crime Study,” Accenture.
such impact cost with the loss of critical data associated with the Lezzi, M., Lazoi, M., Corallo, A., 2018. Cybersecurity for Industry 4.0 in the current
Cyber-Physical System affected by cyber threats. literature: a reference framework. Comput. Ind. 103, 97–110.
Therefore, the ethnographic observation of the aeronautical Barbier, J., Buckalew, L., Loucks, J., Moriarty, R., O’Connell, K., Riegel, M., 2016. Cyber-
security As a Growth Advantage. CISCO.
manufacturing cells (considered a case study representative of the Waslo, R., Lewis, T., Hajj, R., Carton, R., 2017. Industry 4.0 and Cybersecurity. Man-
Industry 4.0), as well as the literature review, have made it possible aging Risk in an Age of Connected Production. Deloitte University Press.
to obtain a four-steps methodology to assess the business impact Deloitte, 2018. Risk Survey 2018. Transforming Risks into Opportunities. Deloitte.
European Network and Information Security Agency (ENISA), 2011. Protecting
level due to cybersecurity breaches in 4.0-manufacturing environ- Industrial Control Systems - Annex III: ICS Security Related Standards, Guide-
ments. The proposed impacts assessment methodology provides lines and Policy Documents. ENISA.
useful guidance for companies in addressing cybersecurity issues in E.C.S. Organisation, 2017. State of the Art Syllabus - Overview of Existing Cyberse-
curity Standards and Certification Schemes. ECSO.
the context of Industry 4.0, assessing cyber risks according to NIST’s Ross, R.S., 2012. “NIST Special Publication 800-30. Guide for Conducting Risk Assess-
asset/impact-oriented approach. The methodology is based on the ments. National Institute of Standards and Technology.
analysis of critical assets to be protected against cyber-attacks, neg- Marketsand Markets, 2015. Aviation Cyber Security Market by Component (Service,
Solution), by Deployment (On-Cloud, On-premise), & by Region (North America,
ative business impacts due to cybersecurity breaches and the way in
Europe, Asia-pacific, Middle East & Africa, Latin America) - Forecast to 2020.
which these two elements are related, providing companies with a Marketsand Markets.
useful approach for assessing the cost/level of impacts and support European Union Agency for Networked and Information Security (ENISA), 2018.
“Good Practice for Security of Internet of Things in the Context of Smart Manu-
the decision making process.
facturing,” ENISA.
It is expected that the results of this paper will support com- Behrendt, A., Müller, N., Odenwälder, P., Schmitz, C., 2017. Industry 4.0
panies in facing cybersecurity issues affecting the Industry 4.0, demystified—lean’s next level,” McKinsey&Company, March [Online].
while involving technical and nontechnical management staff in Available: https://www.mckinsey.com/business-functions/operations/our-
insights/industry-4-0-demystified-leans-next-level. [Accessed 12 June
the decision making process. In particular, the application of the 2018].
methodology within networked manufacturing contexts could Tuptuk, N., Hailes, S., 2018. Security of smart manufacturing systems. J. Manuf. Syst.
steer companies towards targeted investments in the field of cyber- 47, 93–106.
Wu, D., Ren, A., Zhang, W., Fan, F., Liu, P., Fu, X., 2018. Cybersecurity for digital
security. manufacturing. J. Manuf. Syst. 48, 3–12.
However, the methodology does not take into account the Sullivan, D., Luiijf, E., Colbert, E.J.M., 2016. Components of Industrial Control Systems.
exploitable weaknesses/deficits of networked manufacturing sys- In: Cyber-security of SCADA and Other Industrial Control Systems. Springer,
Cham, pp. 15–28.
tems, nor does it identify the cyber threat events that could exercise ISA, North Carolina 2016. “The 62443 Series of Standards,” ISA.
such vulnerabilities. The next step of research will consist in Theron, P., Lazari, A., 2018. The IACS Cybersecurity Certification Framework (ICCF):
extending the methodology to include new steps of action also in Lessons from the 2017 Study of the State of the Art. European Commission.
ANSSI, 2012. “Managing Cybersecurty for Industrial Control Systems,” ANSSI.
this direction.
ANSSI, 2014a. Classification Method and Key Measures,” ANSSI.
Moreover, since this study focuses on CNC manufacturing ANSSI, 2014b. “Detailed Measures,” ANSSI.
systems, the application of the methodology in industrial environ- American Petroleum Institute (API), 2016. API STD 1164,” American Petroleum Insti-
tute (API).
ments based on different production technologies (such as additive
Bundesamt für Sicherheit in der Informationstechnik (BSI), 2013. ICS Security Com-
manufacturing) could give rise to different results in the assess- pendium. Federal Office for Information Security (BSI).
ment of business impacts. In fact, if the critical data associated U.S. Department of Homeland Security, 2011. Catalog of Control System Security:
with different types of manufacturing machines are the same, as Reccommendations for Standards Developers. Homeland Security.
Industrial Control Systems Cyber Emergency Response Team, 2016. ICS-CERT Annual
well as the potential business impacts due to the loss of confiden- Assessment Report,” National Cybersecurity and Communications Integration
tiality, integrity and availability of such data, their combination in Center (NCCIC).
the impacts matrix changes depending on the production technol- Stouffer, k., Pillitteri, V., Lightman, S., Abrams, M., Hahn, A., 2015. “NIST Special Pub-
lication 800-82. Guide to Industrial Control Systems (ICS) Security,” National
ogy and business strategy. Similarly, the cost and magnitude of Institute of Standard and Technology (NIST).
the impacts identified in the matrix changes. In order to expand NIST, 2013. NIST Special Publication 800-53. Security and Privacy Controls for Fed-
the study, future research will apply the methodology in a 4.0- eral Information Systems and Organizations. National Institute of Standards and
Technology.
manufacturing environment where the business impacts level due NIST, 2018. Framework for Improving Critical Infrastructure Cybersecurity. National
to cybersecurity breaches can be assessed as a function of the Institute of Standards and Technology.
change in the type of machines connected to the network. Finally, Babiceanu, R.F., Seker, R., 2017. Cybersecurity and resilience modelling for software-
defined networks-based manufacturing application. In: Service Orientation in
the application of the methodology requires the involvement of the
Holonic and Multi-Agent Manufacturing. Studies in Computational Intelligence.
company’s key informants in a series of activities, such as partici- Springer, Cham, pp. 167–176.
pation in focus groups, filling in online questionnaires, carrying out Jansen, C., Jeschke, S., 2018. Mitigating risks of digitalization through managed
industrial security services. AI Soc. J., 1–11.
semi-structured interviews. In order to obtain a good response rate,
Kobara, K., 2016. Cyber physical security for industrial control systems and IoT. IEICE
and therefore consistent results, it is necessary to have the support Trans. Inf. Syst. E99D (4), 787–795.
of top management. In other words, the management of cyberse- Zhu, Q., Craig, R., Basar, T., 2011. “A hierarchical security architecture for cyber-
curity issues will need to be a strategic and operational priority for physical systems. In: 2011 4th International Symposium on Resilient Control
Systems, Boise, ID, USA.
the company. Radanliev, P., De Roure, D., Nurse, J.R., Nicolescu, R., Huth, H., Cannady, S., Montalvo,
R.M., 2018a. Integration of cyber security frameworks, models and approaches
A. Corallo, M. Lazoi and M. Lezzi / Computers in Industry 114 (2020) 103165 15
for building design principles for the internet-of-things in industry 4.0. In: Living Gatzert, N., 2015. The impact of corporate reputation and reputation damaging
in the Internet of Things: Cybersecurity of the IoT - 2018, London. events on financial performance: empirical evidence from the literature. Eur.
Radanliev, P., De Roure, D.C., Nicolescu, R., Michael, H., Montalvo, R.M., Cannady, S., Manag. J. 33 (no. 6), 485–499.
Burnap, P., 2018b. Future developments in cyber risk assessment for the internet Hovav, A., D’Arcy, J., 2003. The impact of denial-of-Service attack announcements
of things. Comput. Ind. 102, 14–22. on the market value of firms. Risks Manage. Insurance Rev. 6 (2), 97–121.
Januario, F., Carvalho, C., Cardoso, A., Gil, P., 2016. Security challenges in SCADA
systems over wireless sensor and actuator networks. International Congress on Marianna Lezzi is a PhD candidate in Complex System Engineering at the Univer-
Ultra Modern Telecommunications and Control Systems and Workshops 2016. sity of Salento. Her research is about the management of cybersecurity risks within
Ren, A., Wu, D., Zhang, W., Terpenny, J., Liu, P., 2017. Cyber security in smart manufac- Industry 4.0 contexts. She has been involved in European research projects (such as
turing: survey and challenges. 67th Annual Conference and Expo of the Institute PRACTICE and TOREADOR) based on the development of models for the management
of Industrial Engineers. of Big Data belonging to aeronautical companies. She has experience in the defini-
Creswell, J.W., Creswell, J.D., 2018. Research Design, Los Angeles. SAGE. tion of innovative business management methodologies and secure collaborative
Butlewski, M., Misztal, A., Belu, N., 2016. An analysis of the benefits of ethnography processes within the aeronautical supply chain.
design methods for product modelling. IOP Conference Series: Materials Science
Mariangela Lazoi, PhD, is Researcher at the Department of Innovation Engineering,
and Engineering, vol. 145.
University of Salento. She received the Ph.D. degree in eBusiness from the University
Blomberg, J., Burrel, M., Guest, G., 2003. An ethnographic approach to design. In: The
of Salento, Lecce, in 2009. She is scientific responsible of national research projects
Human-Computer Interaction Handbook. Fundamentals, Evolving Technologies
about new technologies implementation in manufacturing and creative industries
and Emerging Applications. Lawrence Erlbaum Associates, Publishers.
and is involved in European research projects about big-data management and
Mohedas, I.S.S.A., Daly, S.R., Sienko, K.H., 2015. Applying design ethnography to prod-
product-service system implementation. She is responsible of the area Digital Engi-
uct evaluation: a case example of a medical device in a low-resource setting. In:
neering for Industry in the CORELab (Collaborative hOlistic Research Approach) in the
International Conference on Engineering Design, ICED15, Milan.
University of Salento and collaborates with different companies addressing tecno-
Kosaka, M., 2012. In: Naidoo, Loshini (Ed.), A Service Value Creation Model and
organizational solutions. Her research interests are product design methods and
the Role of Ethnography. An Ethnography of Global Landscapes and Corridors.
tools, product lifecycle management, business process management and collabora-
InTech.
tive tools.
Jones, R., 2006. Experience models: where ethnography and design meet. Ethno-
graphic Praxis in Industry Conference Proceedings. Angelo Corallo received the M.Sc. degree in physics from the University of Lecce,
Bryman, A., Bell, E., 2015. Business Research Methods. Oxford University Press, Lecce, Italy, in 1999. He is an Associated Professor with the Department of Inno-
Oxford. vation Engineering, University of Salento, Lecce, and is responsible of CORELab
Pfleeger, C.P., P. S. L, M. J, 2015. Security in Computing. Prentice Hall. (Collaborative hOlistic Research Approach Laboratory) in the same University.
He, H., Maple, C., Watson, T., Tiwari, A., Mehnen, J., Jin, Y., Gabrys, B., 2016. The His main research interests include technologies and organizational strategies in
security challenges in the IoT enabled cyber-physical systems and opportunities complex industries, knowledge management, and collaborative working environ-
for evolutionary computing & other computational intelligence. In: 2016 IEEE ments in project and process-based organizations, with specific reference to the
Congress on Evolutionary Computation. aerospace industry and languages, methodologies, and technologies for knowledge
Corbò, G., Foglietta, C., Palazzo, C., Panzieri, S., 2017. Smart behavioral filter for modelling. He is coordinator or scientific responsible of several research projects
industrial internet of things. In: Mobile Networks and Application. Springer, pp. such as: X@Work, Open Philosophies for Associative Autopoietic Digital Ecosys-
1–8. tems (OPAALS), Distributed Information Systems for Co-ordinated Service Oriented
Tao, F., Qi, Q., Liu, A., Kusiak, A., 2018. Data-driven smart manufacturing. J. Manuf. interoperability (DISCORSO), Multichannel Adaptive Information system (MAIS),
Syst. 48, 157–169. Knowledge-based Innovation for the Web Infrastructure (KIWI), Towards Evolving
Turner, H., White, J., Camelio, J.A., Williams, C., Amos, B.P.R., 2015. Bad parts: are our Knowledge-based internetworked Enterprise (TEKNE) Extended Net-Lab (X-Net-
manufacturing systems at risk of silent cyberattacks? IEEE Secur. Priv. 13 (3), Lab), Digital Business Ecosystem (DBE), Privacy-Preserving Computation in the
40–47. Cloud (PRACTICE), Secure Supply Chain Management (SecureSCM), Collaborative &
Stoneburmer, G., Goguen, A., Feringa, A., 2002. Risk management guide for informa- Robust Engineering using Simulation Capability Enabling Next Design Optimisation
tion technology systems. NIST Spec. Publ., 800–830. (CRESCENDO), and TrustwOrthy model-awaRE Analytics Data platfORm (TORE-
Ahmad, A., Bosua, R., Scheepers, R., 2014. Protecting organizational competitive ADOR).
advantage: a knowledge perspective. Comput. Secur. 42, 27–39.