Research Article

Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process

Table 9

Implication of the AHP analysis result on the ICS in each layer.

ConsiderationsLayersOperation layerControl layerField device layer

Practical environmentsSecurity aspectA lot of user accesses that need to be identified for securityVarious events of devices, systems, and networks that need to be handled for service continuityControl end-point devices along with ethernet or the IoT network
RisksSocial engineering attacks or user carelessnessService abort or collapse availabilityManipulating command attack to end-point devices

Top priority for security resources investmentHierarchy ISecurity functionsService continuityService continuity
Hierarchy IIIdentification
Authentication
Access control
Event responsePhysical interface protection

Based on
TTAK.KO-12.0307 standardPriority analysisAnalytic hierarchy process