Affiliation:
1. National High Magnetic Field Laboratory, 1800 E. Paul Dirac Drive, Tallahassee, FL 32310, USA
2. Information Security and Privacy Office, Florida State University, 1721 W. Paul Dirac Dr., Tallahassee, FL 32310, USA
Abstract
A cybersecurity approach for a large-scale user facility is presented—utilizing the National High Magnetic Field Laboratory (NHMFL) at Florida State University (FSU) as an example. The NHMFL provides access to the highest magnetic fields for scientific research teams from a range of disciplines. The unique challenges of cybersecurity at a widely accessible user facility are showcased, and relevant cybersecurity frameworks for the complex needs of a user facility with industrial-style equipment and hazards are discussed, along with the approach for risk identification and management, which determine cybersecurity requirements and priorities. Essential differences between information technology and research technology are identified, along with unique requirements and constraints. The need to plan for the introduction of new technology and manage legacy technologies with long usage lifecycles is identified in the context of implementing cybersecurity controls rooted in pragmatic decisions to avoid hindering research activities while enabling secure practices, which includes FAIR (findable, accessible, interoperable, and reusable) and open data management principles. The NHMFL’s approach to FAIR data management is presented. Critical success factors include obtaining resources to implement and maintain necessary security protocols, interdisciplinary and diverse skill sets, phased implementation, and shared allocation of NHMFL and FSU responsibilities.
Funder
National Science Foundation
State of Florida
Reference57 articles.
1. The National High Magnetic Field Laboratory;Hannahs;J. Low Temp. Phys.,2010
2. (2023, February 21). National MagLab Website. Available online: https://nationalmaglab.org/.
3. (2022, March 10). Annual Report—MagLab. Available online: https://nationalmaglab.org/research/publications-all/annual-reports.
4. Kovacevic, A., and Nikolic, D. (2023, February 21). Cyber Attacks on Critical Infrastructure: Review and Challenges. Available online: https://www.igi-global.com/chapter/cyber-attacks-on-critical-infrastructure/www.igi-global.com/chapter/cyber-attacks-on-critical-infrastructure/115745.
5. Thakur, K., Ali, M.L., Jiang, N., and Qiu, M. (2016, January 9–10). Impact of Cyber-Attacks on Critical Infrastructure. Proceedings of the 2016 IEEE 2nd International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing (HPSC), and IEEE International Conference on Intelligent Data and Security (IDS), New York, NY, USA.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献