Research Article
Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process
Table 9
Implication of the AHP analysis result on the ICS in each layer.
| Considerations | Layers | Operation layer | Control layer | Field device layer |
| Practical environments | Security aspect | A lot of user accesses that need to be identified for security | Various events of devices, systems, and networks that need to be handled for service continuity | Control end-point devices along with ethernet or the IoT network | Risks | Social engineering attacks or user carelessness | Service abort or collapse availability | Manipulating command attack to end-point devices |
| Top priority for security resources investment | Hierarchy I | Security functions | Service continuity | Service continuity | Hierarchy II | Identification Authentication Access control | Event response | Physical interface protection |
| Based on | TTAK.KO-12.0307 standard | Priority analysis | Analytic hierarchy process |
|
|