A Review of Cybersecurity Incidents in the Food and Agriculture Sector
- URL: http://arxiv.org/abs/2403.08036v1
- Date: Tue, 12 Mar 2024 19:15:20 GMT
- Title: A Review of Cybersecurity Incidents in the Food and Agriculture Sector
- Authors: Ajay Kulkarni, Yingjie Wang, Munisamy Gopinath, Dan Sobien, Abdul
Rahman, and Feras A. Batarseh
- Abstract summary: This manuscript reviews disclosed and documented cybersecurity incidents in the Food & Agriculture (FA) sector.
Thirty cybersecurity incidents were identified, which took place between July 2011 and April 2023.
The need for AI assurance in the FA sector is explained, and the Farmer-Centered AI (FCAI) framework is proposed.
- Score: 2.0358239640633737
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The increasing utilization of emerging technologies in the Food & Agriculture
(FA) sector has heightened the need for security to minimize cyber risks.
Considering this aspect, this manuscript reviews disclosed and documented
cybersecurity incidents in the FA sector. For this purpose, thirty
cybersecurity incidents were identified, which took place between July 2011 and
April 2023. The details of these incidents are reported from multiple sources
such as: the private industry and flash notifications generated by the Federal
Bureau of Investigation (FBI), internal reports from the affected
organizations, and available media sources. Considering the available
information, a brief description of the security threat, ransom amount, and
impact on the organization are discussed for each incident. This review reports
an increased frequency of cybersecurity threats to the FA sector. To minimize
these cyber risks, popular cybersecurity frameworks and recent
agriculture-specific cybersecurity solutions are also discussed. Further, the
need for AI assurance in the FA sector is explained, and the Farmer-Centered AI
(FCAI) framework is proposed. The main aim of the FCAI framework is to support
farmers in decision-making for agricultural production, by incorporating AI
assurance. Lastly, the effects of the reported cyber incidents on other
critical infrastructures, food security, and the economy are noted, along with
specifying the open issues for future development.
Related papers
- FSCsec: Collaboration in Financial Sector Cybersecurity -- Exploring the Impact of Resource Sharing on IT Security [0.9374652839580183]
This research aims to provide insights that can help financial institutions make better decisions to protect.
By using simple theories to understand these factors, this research aims to provide insights that can help financial institutions make better decisions to protect.
arXiv Detail & Related papers (2024-10-19T20:03:27Z) - S3C2 Summit 2023-11: Industry Secure Supply Chain Summit [60.025314516749205]
This paper summarizes the Industry Secure Supply Chain Summit held on November 16, 2023.
The goal of this summit was to enable open discussions, mutual sharing, and shedding light on common challenges that industry practitioners with practical experience face when securing their software supply chain.
arXiv Detail & Related papers (2024-08-29T13:40:06Z) - Security in IS and social engineering -- an overview and state of the art [0.6345523830122166]
The digitization of all processes and the opening to IoT devices has fostered the emergence of a new formof crime, i.e. cybercrime.
The maliciousness of such attacks lies in the fact that they turn users into facilitators of cyber-attacks, to the point of being perceived as the weak link'' of cybersecurity.
Knowing how to anticipate, identifying weak signals and outliers, detect early and react quickly to computer crime are therefore priority issues requiring a prevention and cooperation approach.
arXiv Detail & Related papers (2024-06-17T13:25:27Z) - Mind the Gap: Securely modeling cyber risk based on security deviations
from a peer group [2.7910505923792646]
This paper proposes a new framework for cyber posture against peers and estimating cyber risk within specific economic sectors.
We introduce a new top-line variable called the Defense Gap Index representing the weighted security gap between an organization and its peers.
We apply this approach in a specific sector using data collected from 25 large firms.
arXiv Detail & Related papers (2024-02-06T17:22:45Z) - Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking [0.5872014229110214]
Using data from 83 municipalities, we build data-driven cyber risk models and cyber security benchmarks for municipalities.
We produce benchmarks of the security posture in a sector, the frequency of cyber incidents, forecasted annual losses for organizations based on their defensive posture.
These newly derived risk measures highlight the need for continuous measured improvement of cybersecurity readiness.
arXiv Detail & Related papers (2024-02-01T20:45:20Z) - On the Security Risks of Knowledge Graph Reasoning [71.64027889145261]
We systematize the security threats to KGR according to the adversary's objectives, knowledge, and attack vectors.
We present ROAR, a new class of attacks that instantiate a variety of such threats.
We explore potential countermeasures against ROAR, including filtering of potentially poisoning knowledge and training with adversarially augmented queries.
arXiv Detail & Related papers (2023-05-03T18:47:42Z) - Graph Mining for Cybersecurity: A Survey [61.505995908021525]
The explosive growth of cyber attacks nowadays, such as malware, spam, and intrusions, caused severe consequences on society.
Traditional Machine Learning (ML) based methods are extensively used in detecting cyber threats, but they hardly model the correlations between real-world cyber entities.
With the proliferation of graph mining techniques, many researchers investigated these techniques for capturing correlations between cyber entities and achieving high performance.
arXiv Detail & Related papers (2023-04-02T08:43:03Z) - Foveate, Attribute, and Rationalize: Towards Physically Safe and
Trustworthy AI [76.28956947107372]
Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful.
We propose FARM, a novel framework leveraging external knowledge for trustworthy rationale generation in the context of safety.
Our experiments show that FARM obtains state-of-the-art results on the SafeText dataset, showing absolute improvement in safety classification accuracy by 5.9%.
arXiv Detail & Related papers (2022-12-19T17:51:47Z) - Towards a Cybersecurity Testbed for Agricultural Vehicles and
Environments [0.0]
An increasing number of agricultural systems and vehicles are connected to the Internet.
Previous research has focused on general cybersecurity concerns in the farming and agricultural industries.
This paper presents STAVE - a Security Testbed for Agricultural Vehicles and Environments.
arXiv Detail & Related papers (2022-05-12T03:27:06Z) - A System for Automated Open-Source Threat Intelligence Gathering and
Management [53.65687495231605]
SecurityKG is a system for automated OSCTI gathering and management.
It uses a combination of AI and NLP techniques to extract high-fidelity knowledge about threat behaviors.
arXiv Detail & Related papers (2021-01-19T18:31:35Z) - A System for Efficiently Hunting for Cyber Threats in Computer Systems
Using Threat Intelligence [78.23170229258162]
We build ThreatRaptor, a system that facilitates cyber threat hunting in computer systems using OSCTI.
ThreatRaptor provides (1) an unsupervised, light-weight, and accurate NLP pipeline that extracts structured threat behaviors from unstructured OSCTI text, (2) a concise and expressive domain-specific query language, TBQL, to hunt for malicious system activities, and (3) a query synthesis mechanism that automatically synthesizes a TBQL query from the extracted threat behaviors.
arXiv Detail & Related papers (2021-01-17T19:44:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.