Cyber Risk Analysis and Security Practices in Industrial Manufacturing: Empirical Evidence and Literature Insights

Authors

  • Mariam Alrajeh College of Computer Sciences and Information Technology, King Faisal University, Al-Ahsa 31982, Saudi Arabia Author
  • Mohammed Almaiah Author
  • Udit Mamodiya Asso. Prof. & Asso. Dean (Research), Poornima University, Jaipur, India, Jaipur, Raj. India Author

Keywords:

Cyber Risk Analysis, Security Practices, Industrial Manufacturing, cybersecurity threats.

Abstract

Industrial organizations increasingly rely on interconnected information and operational technologies, making them more vulnerable to cyber threats. This paper presents a two part study aimed at identifying critical cybersecurity threats in industrial manufacturing environments and examining effective countermeasures to mitigate these risks. The first part of the study conducts a case study of an industrial manufacturing company with comprehensive production capabilities, including the manufacturing of corrugated boards, trays, and containers for various sectors. Through interviews and discussions with company personnel, key cyber threats affecting the company’s systems were identified, along with an evaluation of the security measures previously implemented to reduce vulnerabilities. The second part of the paper provides a systematic review of existing literature focusing on security countermeasures relevant to the threats identified in the case study. By linking practical industrial challenges with theoretical and empirical research, this study highlights common cybersecurity risks in industrial environments and outlines effective strategies for enhancing security resilience. The findings offer valuable insights for industrial organizations seeking to improve their cybersecurity posture and reduce exposure to evolving cyber threats.

References

[1] Silva, M. (2018, March 7). Risk assessment and risk management: Review of recent advances on their foundation. European Journal of Operational Research. Retrieved March 4, 2022, from https://www.academia.edu/36104661/Risk_assessment_and_risk_management_Re view_of_recent_advances_on_their_foundation

[2] Abd El-Karim, M. S. B. A., Mosa El Nawawy, O. A., & Abdel-Alim, A. M. (2017). Identification and assessment of risk factors affecting construction researchs. HBRC journal, 13(2), 202-216.

[3] Altoryman, A. (2014). Identification and assessment of risk factors affecting construction researchs in the Gulf region: Kuwait and Bahrain. The University of Manchester (United Kingdom).

[4] Aldawood, H., & Skinner, G. (2019). Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues. Future Internet, 11(3), 73.

[5] Wosah, N. P., & Win, T. (2021). Phishing mitigation techniques: A literature survey. arXiv preprint arXiv:2104.06989.

[6] Gupta, B. B., Tewari, A., Jain, A. K., & Agrawal, D. P. (2017). Fighting against phishing attacks: state of the art and future challenges. Neural Computing and Applications, 28(12), 3629-3654.

[7] Conteh, N. Y., & Schmick, P. J. (2016). Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. International Journal of Advanced Computer Research, 6(23), 31.

[8] Ndichu, S., McOyowo, S., Okoyo, H., & Wekesa, C. (2019). A domains approach to remote access logical vulnerabilities classification.

[9] Iqbal, M., & Riadi, I. (2019). Analysis of security virtual private network (VPN) using openVPN. International Journal of Cyber-Security and Digital Forensics, 8(1), 58-65.

[10] Pandikumar, T., & Eshetu, T. (2016). Detecting web application vulnerability using dynamic analysis with penetration testing. International Research Journal of Engineering and Technology, 3(10), 430-433.

[11] Setiawan, E. B., & Setiyadi, A. (2018, August). Web vulnerability analysis and implementation. In IOP conference series: materials science and engineering (Vol. 407, No. 1, p. 012081). IOP Publishing.

[12] Radziszewska, A. (2018). Quality Assessment of E-Commerce Service in the Context of Customer Expiriences. Multidisciplinary Aspects of Production Engineering, 1.

[13] Tzavlopoulos, Ι., Gotzamani, K., Andronikidis, A., & Vassiliadis, C. (2019). Determining the impact of e-commerce quality on customers’ perceived risk, satisfaction, value and loyalty. International Journal of Quality and Service Sciences.

[14] Sari, R. D., Supiyandi, A. P. U., Siahaan, M. M., & Ginting, R. B. (2017). A review of ip and mac address filtering in wireless network security. Int. J. Sci. Res. Sci. Technol, 3(6), 470-473.

[15] Park, S. H., Ganz, A., & Ganz, Z. (1998). Security protocol for IEEE 802.11 wireless local area network. Mobile Networks and Applications, 3(3), 237-246.

[16] Olufemi Olakanmi, O., & Oke, S. O. (2018). MASHED: Security and privacy-aware mutual authentication scheme for heterogeneous and distributed mobile cloud computing services. Information Security Journal: A Global Perspective, 27(5-6), 276-291.

[17] Yan, P., & Yan, Z. (2018). A survey on dynamic mobile malware detection. Software Quality Journal, 26(3), 891-919.

[18] Yesilyurt, M., & Yalman, Y. (2016). Security threats on mobile devices and their effects: estimations for the future. International Journal of Security and Its Applications, 10(2), 13-26.

[19] Karim, A., Ali Shah, S. A., Salleh, R. B., Arif, M., Noor, R. M., Shamshirband, S. (2015). Mobile botnet attacks-an emerging threat: Classification, review and open issues. KSII Transactions on Internet and Information Systems (TIIS), 9(4), 1471-1492.

[20] Chin, A. G., Little, P., Jones, B. H. (2020). An Analysis of Smartphone Security Practices among Undergraduate Business Students at a Regional Public University. International Journal of Education and Development Using Information and Communication Technology, 16(1), 44-61.

[21] Gupta, B. B., Arachchilage, N. A., & Psannis, K. E. (2018). Defending against phishing attacks: taxonomy of methods, current issues and future directions. Telecommunication Systems, 67(2), 247-267.

[22] So, I. G., Gui, A. (2019). Malware Mobile Devices in Indonesia. KnE Social Sciences, 259-

267. 3.Markelj, B., Bernik, I. (2015). Safe use of mobile devices arises from knowing the threats. journal of information security and applications, 20, 84-89.

[23] Adasc ˘ alit¸ei, I. (2019). Smartphones and IoT Security. Infor- ˘ matica Economica, 23(2).

[24] Felt, A. P., Finifter, M., Chin, E., Hanna, S., Wagner, D. (2011, October). A survey of mobile malware in the wild. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices (pp. 3-14).

Additional Files

Published

2026-01-07