Skip to main content
Fig. 7 | Cybersecurity

Fig. 7

From: Bayesian network model to distinguish between intentional attacks and accidental technical failures: a case study of floodgates

Fig. 7

Constructed BN Model – No Evidence Provided. (In this figure, SC1: Easy physical access to sensor, SC2: Easy physical access to communication cable, C1: Easy physical accessibility, C2: No sensor data integrity verification, SC3: Sensor is connected to WIFI, SC4: ICS and corporate networks are interconnected, C3: Easy network accessibility, C4: Presence of software in sensor, C5: No sensor firmware update, TC1: Lack of maintenance of sensor, TC2: Lack of maintenance of communication cable, SC5: Lack of maintenance, SC6: Poor maintenance process, C6: Maintenance issue, C7: No use of EMI shielding technique, SC7: Location of sensor susceptible to severe weather, SC8: Location of sensor susceptible to physical contact of marine vessel, SC9: Location of sensor susceptible to biological fouling, C8: Location of sensor susceptible to external factor, Y: Major cause for sensor sends incorrect water level measurements, TR1: Test/redundant sensor also sends incorrect water level measurements, TR2: Sudden change of water level measurements from sensor, TR3: Suspicious traffic in ICS network, TR4: Abnormalities in other components, TR5: No power in sensor, TR6: Communication cable deteriorated, TR7: Sensor sends correct water level measurements after cleaning sensor, TR8: Sensor sends correct water level measurements after recalibrating sensor, TR9: EMI along cable)

Back to article page