Cybersecurity Challenges in Industrial Control Systems: A Multidisciplinary Review

Authors

  • Ms. Niyati Dhirubhai Odedra Author

Keywords:

Cybersecurity, Industrial Control System, Operational Technology Security, Human Factors, Legacy Systems, AI-driven Threat Detection

Abstract

Generally speaking, this study explores the specific cybersecurity problems faced by Industrial Control Systems (ICS). It emphasizes that these problems are multifaceted due to the integration of various technologies and operational frameworks. The research looks into how ICS are critically vulnerable to cyber threats, collecting and then analyzing data on current vulnerabilities, common threat vectors, and also notable incident case studies across different industrial sectors. Key findings generally reveal that the merging of operational tech with info tech actually intensifies security complexities, and this leads to increased vulnerability to cyber-attacks. Within healthcare, the above findings underscore the heightened risks connected with relying on ICS for essential infrastructure, including critical medical devices, and also hospital operational systems, which highlights the need for robust cybersecurity measures. The implications extend beyond the direct ICS scope, suggesting that enhanced cybersecurity strategies, in most cases, can significantly improve healthcare systems' resilience against cyber threats. By fostering interdisciplinary collaboration between cybersecurity experts, engineers, and healthcare professionals, this research lays the foundation for developing comprehensive strategies that can protect critical industrial environments, and thus ultimately contribute to a more secure and efficient healthcare infrastructure

Downloads

Download data is not yet available.

References

[1] V. F. H. D., "Theoretical and methodological approaches to the management of cyber security risks at critical infrastructure objects: response to cyber incidents and crisis management," Information and Law, 2024. [Online]. Available: https://www.semanticscholar.org/paper/f47385693ab3df225682b5e19f93994c3fa5b27c

[2] V. V., "National Cybersecurity in the Context of Society Digitalization: the Role of Police in Protecting Critical Infrastructure," Bulletin of Kharkiv National University of Internal Affairs, 2025. [Online]. Available: https://www.semanticscholar.org/paper/135109741448886da65de9f16f6fbfb75bb7722e

[3] I. A. B. M. N. H. M. H. R. I. C. M. A. S., "Strategic Deployment of Advance Surveillance Ecosystems: An Analytical Study on Mitigating Unauthorized U.S. Border Entry," Inverge Journal of Social Sciences, 2024. [Online]. Available: https://www.semanticscholar.org/paper/a1e8e60a614e6c7b211cdf92522d494e0cd08b6e

[4] M. O. F., "A Meta-Analysis of Cybersecurity Framework Integration in GRC Platforms: Evidence from U.S. Enterprise Audits," Journal of Sustainable Development and Policy, 2025. [Online]. Available: https://www.semanticscholar.org/paper/a9165926c7be2ae9f71ae6f628740ca8b67fc5a1

[5] K. M. R. C., "Cybersecurity Framework and Risk Mitigation Strategies in the Modern Insurance Industry: A Comprehensive Analysis," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2024. [Online]. Available: https://www.semanticscholar.org/paper/22484eb4fe4019e426afd60d5c849a288f757c63

[6] N. M., "A Review of AI Approaches in Combating Advanced Persistent Threats (APTs) in Cybersecurity," in Proc. 15th Int. Conf. on Computing Communication and Networking Technologies (ICCCNT), 2024. [Online]. Available: https://www.semanticscholar.org/paper/f9bdd0a2eadf4491bd2ab74eeb3c6c3a31335dc8

[7] D. G., "Deep Learning and Artificial Intelligence Framework to Improve the Cyber Security," Authorea, 2022. doi: 10.22541/au.166379475.54266021/v1

[8] S. A. T. A. S. E. K. M. J. M. A. R. C. R. G. E. A., "Explainable Artificial Intelligence (XAI): What we know and what is left to attain Trustworthy Artificial Intelligence," Information Fusion, 2023. doi: 10.1016/j.inffus.2023.101805

[9] M. Asif and S. Agal, "A comprehensive study on lattice, code, and hash-based cryptographic algorithms in post-quantum security with practical applications," IET Conf. Proc., vol. 2025, no. 7, pp. 1176–1183, Jun. 2025, doi: 10.1049/icp.2025.1568

[10] Byeon, H., Kaur, H., Agal, S., Kumar, S., Manu, M., & Maranan, R., "IoT-Enabled Cloud-Based Fair Provable Data Possession Scheme based on Blockchain," in Proc. 2nd Int. Conf. on Smart Technologies for Smart Nation (SmartTechCon), Singapore, 2023, pp. 276–282. doi: 10.1109/SmartTechCon57526.2023.10391469

[11] C. Thingom, M. R. Tammina, A. Joshi, S. Agal, M. S. I. Sudman, & H. Byeon, "Revolutionizing Data Capitalization: Harnessing Blockchain for IoT-Enabled Smart Contracts," in Proc. SmartTechCon, Singapore, 2023, pp. 490–496. doi: 10.1109/SmartTechCon57526.2023.10391104

[12] N. S. A. Polireddi, M. Suryadevara, S. Venkata, S. Rangineni, S. K. R. Koduru, & S. Agal, "A Novel Study on Data Science for Data Security and Data Integrity with Enhanced Heuristic Scheduling in Cloud," in Proc. 2nd Int. Conf. on Automation, Computing and Renewable Systems (ICACRS), India, 2023, pp. 1862–1868. doi: 10.1109/ICACRS58579.2023.10404262

[13] S. Agal and A. Seal, "Secure scalable and intelligent ICT systems using AI Cloud and blockchain technologies," Journal of Emerging Technologies and Innovative Research, vol. 12, no. 5, 2025. doi: 10.56975/jetir.v12i5.561234

[14] I. R. Khan, M. Sandhu, S. Agal, & H. N. Patel, Principles and Practices of Network Security. Xoffencer International Book Publication House, 2023. doi: 10.5281/zenodo.7936756

[15] F. C. B. S. M. F. A. N. K. M. M. F. M. S. M., "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, 2022. doi: 10.1057/s41288-022-00266-6

[16] H. A. Y. M., "Exploring the Full Potentials of IoT for Better Financial Growth and Stability: A Comprehensive Survey," Sensors, vol. 23, no. 19, 2023. doi: 10.3390/s23198015

[17] D. M. J. A. N. P., "A Literature Review of the Challenges and Opportunities of the Transition from Industry 4.0 to Society 5.0," Energies, vol. 15, no. 76276, 2022. doi: 10.3390/en15176276

[18] M. S. E. F. E. P. H. Y. Q. N. M. D. M. D., "Digital Twin: Origin to Future," Applied System Innovation, vol. 4, no. 2, 2021. doi: 10.3390/asi4020036

[19] S. A. L. O. O. L. A. A. A. J. M. D. D. M. B. O. O. A. E. A., "Artificial intelligence in the construction industry: A review of present status, opportunities and future challenges," Journal of Building Engineering, vol. 44, 2021. doi: 10.1016/j.jobe.2021.103299

[20] L. A. J. B. A. A. J. S. A. S. A. B. S. N. A. M. A. F. E. A., "A survey on deep learning tools dealing with data scarcity: definitions, challenges, solutions, tips, and applications," Journal of Big Data, 2023. doi: 10.1186/s40537-023-00727-2

[21] K. K. S. K., "A systematic literature review of how cybersecurity-related behavior has been assessed," Information and Computer Security, 2023. doi: 10.1108/ics-08-2022-0139

[22] A. K. J. H. N. K. O. G. W. T. M. A. E. C. A. A. M. B. E. A., "Shaping the Metaverse into Reality: A Holistic Multidisciplinary Understanding of Opportunities, Challenges, and Avenues for Future Investigation," Journal of Computer Information Systems, 2023. doi: 10.1080/08874417.2023.2165197

[23] Y. K. D. L. H. A. M. B. S. R. M. G. M. M. A. D. D. E. A., "Metaverse beyond the hype: Multidisciplinary perspectives on emerging challenges, opportunities, and agenda for research, practice and policy," International Journal of Information Management, 2022. doi: 10.1016/j.ijinfomgt.2022.102542

[24] Y. K. D. N. K. L. H. E. S. A. J. A. K. K. A. M. B. E. A., "So what if ChatGPT wrote it? Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI," International Journal of Information Management, 2023. doi: 10.1016/j.ijinfomgt.2023.102642

[25] H. T. M. S. A. F. M. M. D. H. S. F. T., "6G Wireless Systems: Vision, Requirements, Challenges, Insights, and Opportunities," Proceedings of the IEEE, vol. 109, no. 7, pp. 1166–1199, 2021. doi: 10.1109/jproc.2021.3061701

Published

2025-08-25

How to Cite

Cybersecurity Challenges in Industrial Control Systems: A Multidisciplinary Review. (2025). PUXplore Multidisciplinary Journal of Engineering, 1(1). https://puxplore.paruluniversity.ac.in/index.php/PXMJE/article/view/12

Similar Articles

You may also start an advanced similarity search for this article.