Research Article

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Table 10

Comparison of the approaches for the ICS information security.

ParametersApproaches
Choi [12]Ko et al. [13]Hoon Nah and Na [11]TTAK.KO-12.0307 [10]Proposed approach

Proposed exclusive security requirementsNoYesPartially yesYesYes
Utilization of a standardNoNoYesYesYes
Concept of ICS layersNot considered3 levels (according to data sensitivity)Not considered3 layers (security reference model)3 layers (security reference model)
Security requirements priority analysisYesYesNot consideredNot consideredYes
Security resource investment decisionUsing the risk evaluation checklistUsing the number of vulnerabilities in the attack pathNot consideredNot consideredUsing the priorities
Usability as a guidelinesPartially possiblePartially possiblePartially possibleImpossiblePossible