Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures

Determining a Return on Investment for Cybersecurity Technologies in Networked Critical Infrastructures

Roger A. Hallman, Maxine Major, Jose Romero-Mariona, Richard Phipps, Esperanza Romero, Scott M. Slayback, Francisco Tacliad, John M. San Miguel
Copyright: © 2021 |Pages: 22
DOI: 10.4018/IJOCI.2021040105
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Much of modern life is dependent on networked critical infrastructure systems—many known to be susceptible to cyberattacks—such as the electrical grid, water purification, and transportation systems. The consequences of a successful cyberattack on these systems could be catastrophic. Appropriate levels and strategies for cybersecurity investment for networked critical infrastructures present a serious challenge that administering organizations, whether public or private, must overcome in order to provide resilient services. This challenge includes understanding the actual vulnerabilities of an organization's networked systems, as well as the cost of a successful cyberattack on those systems. On top of this, an organization's cybersecurity acquisition workforce must be able to discern reality from the marketing hype that is produced by cybersecurity sales forces. Many product offerings from industry promise to secure critical infrastructures, but there is no good method for determining which product (or combination of products) is most effective for a specific environment or scenario. This paper presents a return on cybersecurity investment (ROCI) model utilized, together with a previously-developed framework for evaluating cybersecurity technologies, by the resilient critical infrastructures through secure and efficient microgrids (ReCIst) capability. ReCIst uses this model to guide decision makers on how to best implement cybersecurity towards energy resiliency, from financial, security posture, and energy efficiency perspectives. Challenges and the current state of cyber investment modeling in this domain are presented along with technical details on ReCIst's ROCI model and future work.
Article Preview
Top

1. Introduction

Cybersecurity is a complex challenge faced by many organizations, from individuals surfing the Internet to public and private organizations. Both public and private organizations have fallen victim to cyberattacks (Davis 2015, Cieply & Barnes 2015). Moreover, as Internet-connected systems are integrated more and more into the average person’s daily life, cyberattacks have become a normal aspect of modern life for many people. While many attacks are of little to no consequence, many attacks end up becoming high-visibility and costly cyber incidents, causing long-lasting damage to the organization. There are any number of reasons for an organization’s network to be susceptible to a cyberattack, ranging from personnel with poor online practices to not patching vulnerabilities in a timely manner. Cybersecurity investment is another challenge for organizations. Indeed, “cybersecurity investment” deals with multiple challenges including underinvestment, lifecycle management, etc.

For organizations that own and operate cyber-physical systems—specifically industrial systems, critical infrastructure, or other legacy systems—cybersecurity is an especially challenging problem due to the fact that these systems are often comprised of components that were not designed with security or modern interconnectedness in mind. Moreover, a country’s networked critical infrastructure systems can make an enticing target for unscrupulous adversaries. Indeed, cyberattacks against critical infrastructure are well known to lead to severe consequences (Liang et al. 2016), as energy system disruption can lead to critical systems (e.g.,waste processing, hospital/medical systems, traffic lights,refrigeration/storage systems, etc.) failing. Many countries’ critical infrastructure systems are known to be vulnerable to cyberattack and, in spite of the fact that they are not in active conflict, adversarial actors may have already compromised those systems (US-CERT 2018).

To address these challenges, we developed the Resilient Critical Infrastructures through Secure and Efficient Microgrids (ReCIst) project, funded through the United States’ Office of Naval Research Energy System Technology Evaluation Program (ESTEP)1, to develop a decision-support capability that provides visibility into the true costs of introducing cybersecurity solutions to industrial power grids. The decision of what cybersecurity solution would be best is ultimately a financial decision, therefore we developed a return on investment model to help acquisition workers navigate the costs of their own facilities in comparison with the costs and benefits associated with a virtual marketplace of potential cybersecurity solutions. This paper synthesises and extends our previous work as follows:

  • We recap our previously-developed decision support framework for a cybersecurity acquisition workforce (Romero-Mariona., Hallman, Kline, Miguel, Major & Kerr 2016) and demonstrate its utility by incorporating technology evaluations into a fully-described framework for determining a Return on Cybersecurity Investment (ROCI) (Hallman et al. 2020, Major et al. 2020);

  • We further describe an instantiation of the ROCI model to quantify the effects of cybersecurity investment for critical infrastructure.

To the best of our knowledge, ours is the first cybersecurity investment framework that attempts to quantify a return on investment for the critical infrastructure sector.

The remainder of this paper is organized as follows: Background information is provided in Section 2, along with a survey of previous work on cybersecurity investment strategies and cybersecurity economics. A recap of our cybersecurity technology evaluation and decision support framework is given in Section 3. Section 4 describes the Return on Cybersecurity Investment model within the context of industrial control systems and networked critical infrastructure while Section 5 demonstrates the feeding of technology evaluations to determine a ROCI for the adoption of a suite of cybersecurity technologies. Concluding remarks and ongoing/planned work is found in Section 6.

Top

We begin by presenting background information covering attempts to quantify the true costs of a cyberattack, cyber insurance, and risk modeling. We then present a literature review of previous cybersecurity investment models. The overwhelming majority of work cited focuses on information technology systems rather than operational technology systems.

Complete Article List

Search this Journal:
Reset
Volume 14: 1 Issue (2024): Forthcoming, Available for Pre-Order
Volume 13: 1 Issue (2023)
Volume 12: 4 Issues (2022)
Volume 11: 4 Issues (2021)
Volume 10: 4 Issues (2020)
Volume 9: 4 Issues (2019)
Volume 8: 4 Issues (2018)
Volume 7: 4 Issues (2017)
Volume 6: 4 Issues (2016)
Volume 5: 4 Issues (2015)
Volume 4: 4 Issues (2014)
Volume 3: 4 Issues (2012)
Volume 2: 4 Issues (2011)
Volume 1: 4 Issues (2010)
View Complete Journal Contents Listing