Research Article
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process
Table 10
Comparison of the approaches for the ICS information security.
| Parameters | Approaches | Choi [12] | Ko et al. [13] | Hoon Nah and Na [11] | TTAK.KO-12.0307 [10] | Proposed approach |
| Proposed exclusive security requirements | No | Yes | Partially yes | Yes | Yes | Utilization of a standard | No | No | Yes | Yes | Yes | Concept of ICS layers | Not considered | 3 levels (according to data sensitivity) | Not considered | 3 layers (security reference model) | 3 layers (security reference model) | Security requirements priority analysis | Yes | Yes | Not considered | Not considered | Yes | Security resource investment decision | Using the risk evaluation checklist | Using the number of vulnerabilities in the attack path | Not considered | Not considered | Using the priorities | Usability as a guidelines | Partially possible | Partially possible | Partially possible | Impossible | Possible |
|
|