Visible to the public Cyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies

TitleCyber-Physical IT Assessment Tool and Vulnerability Assessment for Semiconductor Companies
Publication TypeConference Paper
Year of Publication2018
AuthorsCayetano, Trisha Anne, Dogao, Averyl, Guipoc, Cristopher, Palaoag, Thelma
Conference NameProceedings of the 2Nd International Conference on Cryptography, Security and Privacy
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-6361-7
Keywordscyber-attacks, Cyber-physical security, cybersecurity, Internet of Things, IT Security, IT security vulnerabilities, Metrics, pubcrawl, Resiliency, Supply Chain Risk Assesment
Abstract

Information and systems are the most valuable asset of almost all global organizations. Thus, sufficient security is key to protect these assets. The reliability and security of a manufacturing company's supply chain are key concerns as it manages assurance & quality of supply. Traditional concerns such as physical security, disasters, political issues & counterfeiting remain, but cyber security is an area of growing interest. Statistics show that cyber-attacks still continue with no signs of slowing down. Technical controls, no matter how good, will only take the company thus far since no usable system is 100 percent secure or impenetrable. Evaluating the security vulnerabilities of one organization and taking the action to mitigate the risks will strengthen the layer of protection in the manufacturing company's supply chain. In this paper, the researchers created an IT Security Assessment Tool to facilitate the evaluation of the sufficiency of policy, procedures, and controls implemented by semiconductor companies. The proposed IT Security Assessment Tool was developed considering the factors that are critical in protecting the information and systems of various semiconductor companies. Subsequently, the created IT Security Assessment Tool was used to evaluate existing semiconductor companies to identify their areas of security vulnerabilities. The result shows that all suppliers visited do not have cyber security programs and most dwell on physical and network security controls. Best practices were shared and action items were suggested to improve the security controls and minimize risk of service disruption for customers, theft of sensitive data and reputation damage.

URLhttp://doi.acm.org/10.1145/3199478.3199482
DOI10.1145/3199478.3199482
Citation Keycayetano_cyber-physical_2018