{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T15:13:45Z","timestamp":1777130025219,"version":"3.51.4"},"reference-count":35,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,2,12]],"date-time":"2022-02-12T00:00:00Z","timestamp":1644624000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"abstract":"<jats:p>The developments of reduced manning on offshore facilities and increased information transfer from offshore to land continue and may also be a prerequisite for the future survival of the oil and gas industry. A general requirement from the operators has emerged in that all relevant information from offshore-located systems should be made available so that it can be analysed on land. This represents a challenge to safety in avoiding negative impacts and potential accidents for these facilities. The layered Purdue model, which helps protect OT systems from unwanted influences through network segregation, is undermined by the many new connections arising between the OT systems and the surroundings. Each individual connection is not necessarily a problem; however, in aggregate, they add to the overall complexity and attack surface thereby exposing the OT systems to increased cyber risk. Since the OT systems are critical to controlling physical processes, the added connections represent a challenge not only to security but also to safety.<\/jats:p>","DOI":"10.3390\/jcp2010003","type":"journal-article","created":{"date-parts":[[2022,2,13]],"date-time":"2022-02-13T21:08:43Z","timestamp":1644786523000},"page":"20-41","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Security and Independence of Process Safety and Control Systems in the Petroleum Industry"],"prefix":"10.3390","volume":"2","author":[{"given":"Tor","family":"Onshus","sequence":"first","affiliation":[{"name":"Department of Engineering Cybernetics, Norwegian University of Science and Technology (NTNU), 7491 Trondheim, Norway"}]},{"given":"Lars","family":"Bodsberg","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"given":"Stein","family":"Hauge","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7127-6694","authenticated-orcid":false,"given":"Martin Gilje","family":"Jaatun","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9045-6815","authenticated-orcid":false,"given":"Mary Ann","family":"Lundteigen","sequence":"additional","affiliation":[{"name":"Department of Engineering Cybernetics, Norwegian University of Science and Technology (NTNU), 7491 Trondheim, Norway"}]},{"given":"Thor","family":"Myklebust","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"given":"Maria Vatshaug","family":"Ottermo","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4026-3326","authenticated-orcid":false,"given":"Stig","family":"Petersen","sequence":"additional","affiliation":[{"name":"Software Engineering, Safety and Security, SINTEF Digital, P.O. Box 4760 Torgarden, 7465 Trondheim, Norway"}]},{"given":"Egil","family":"Wille","sequence":"additional","affiliation":[{"name":"SINTEF \u00c5lesund, Borgundvegen 340, 6009 \u00c5lesund, Norway"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,12]]},"reference":[{"key":"ref_1","unstructured":"Gartner (2022, February 06). Information Technology Glossary. Gartner Web Glossary. Available online: https:\/\/www.gartner.com\/en\/information-technology\/glossary\/operational-technology-ot."},{"key":"ref_2","unstructured":"(2010). Functional Safety of Electrical\/Electronic\/Programmable Electronic Safety-Related Systems\u2013Parts 1 to 7 (Standard No. IEC Standard 61508:2010)."},{"key":"ref_3","unstructured":"(2016). Functional Safety\u2013Safety Instrumented Systems for the Process Industry Sector\u2013Part 1: Framework, Definitions, System, Hardware and Application Programming Requirements (Standard No. IEC Standard 61511\u20131:2016)."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Rausand, M. (2011). Risk Assessment: Theory, Methods, and Applications, John Wiley & Sons.","DOI":"10.1002\/9781118281116"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1002\/prs.12295","article-title":"More Issues with Layer of Protection Analysis\u2014From the Originators","volume":"41","author":"Bridges","year":"2021","journal-title":"Process Saf. Prog."},{"key":"ref_6","unstructured":"Norsk Olje&Gass (2020). Application of iec 61508 and iec 61511 in the Norwegian Petroleum Industry (Recommended SIL Requirements), Norsk Olje & Gass. NOROG Guideline 070; Revision 4."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/0166-3615(94)90017-5","article-title":"The Purdue enterprise reference architecture","volume":"24","author":"Williams","year":"1994","journal-title":"Comput. Ind."},{"key":"ref_8","unstructured":"(2021). IEC Blog (Standard No. Understanding IEC 62443)."},{"key":"ref_9","unstructured":"DNV (2021). Cyber Secure Class Notation, DNV."},{"key":"ref_10","unstructured":"DNV (2021). Cyber Security in the Oil and Gas Industry Based on IEC 62443, DNV. Technical Report DNV-RP-G108."},{"key":"ref_11","unstructured":"DIN (2015). Industry 4.0\u2013Success with Standards, DIN Website. Available online: https:\/\/www.din.de\/en\/innovation-and-research\/industry-4-0."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Lu, H., Guo, L., Azimi, M., and Huang, K. (2019). Oil and Gas 4.0 era: A systematic review and outlook. Computers in Industry, Elsevier.","DOI":"10.1016\/j.compind.2019.06.007"},{"key":"ref_13","unstructured":"(2022, January 23). Schweichhart. Reference Architectural Model Industrie 4.0 (RAMI 4.0)\u2014An Introduction. Plattform Industrie 4.0 Website. Available online: https:\/\/www.plattform-i40.de\/IP\/Redaktion\/EN\/Downloads\/Publikation\/rami40-an-introduction.pdf?__blob=publicationFile&v=7."},{"key":"ref_14","unstructured":"OPC Foundation (2021). Unified Architecture (UA), OPC Foundation."},{"key":"ref_15","unstructured":"NAMUR (2021). NAMUR Open Architecture, NAMUR."},{"key":"ref_16","unstructured":"Shafto, M., Conroy, M., Doyle, R., Glaessgen, E., Kemp, C., LeMoigne, J., and Wang, L. (2010). Draft Modeling, Simulation, Information Technology & Processing Roadmap, Technical Report Technology Area 11."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Wagner, C., Grothoff, J., Epple, U., Drath, R., Malakuti, S., Gr\u00fcner, S., Hoffmeister, M., and Zimmermann, P. (2017, January 12\u201315). The role of the Industry 4.0 asset administration shell and the digital twin during the life cycle of a plant. Proceedings of the 2017 22nd IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Limassol, Cyprus.","DOI":"10.1109\/ETFA.2017.8247583"},{"key":"ref_18","unstructured":"Hicks, B. (2019). Industry 4.0 and Digital Twins: Key lessons from NASA, The Future Factory Blog The Future Factory."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Kang, M.H., and Moskowitz, I.S. (1993, January 3\u20135). A pump for rapid, reliable, secure communication. Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, VA, USA.","DOI":"10.1145\/168588.168604"},{"key":"ref_20","unstructured":"Jones, D.W., and Bowersox, T.C. (2006, January 1). Secure data export and auditing using data diodes. Proceedings of the USENIX Electronic Voting Technology Workshop (EVT \u201906), Vancouver, BC, Canada."},{"key":"ref_21","unstructured":"Bundesamt fur Sicherheit in der Informationstechnik (2021). Arbit Data Diode 10 GbE, v1.00, Common Criteria Part 3 conformant EAL 7 augmented by ALCFLR.1. Deutsches IT-Sicherheitszertifikat, BSI."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ijcip.2009.02.004","article-title":"A Framework for Incident Response Management in the Petroleum Industry","volume":"2","author":"Jaatun","year":"2009","journal-title":"Int. J. Crit. Infrastruct. Prot."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1504\/IJAACS.2009.026788","article-title":"Secure remote access to autonomous safety systems: A good practice approach","volume":"2","author":"Jaatun","year":"2009","journal-title":"Int. J. Auton. Adapt. Commun. Syst."},{"key":"ref_24","unstructured":"Dragos (2017). CRASHOVERRIDE: Analysis of the Threat to Electric Grid Operations, Dragos Inc.. Technical Report."},{"key":"ref_25","unstructured":"Lee, R.M. (2017). Trisis, Dragos Inc."},{"key":"ref_26","unstructured":"Dragos (2019). Global Oil and Gas Cyber Threat Perspective, Dragos Inc."},{"key":"ref_27","unstructured":"Jaatun, M.G., Wille, E., Bernsmed, K., and Kilskar, S.S. (2021). Grunnprinsipper for IKT-sikkerhet i industrielle IKT-systemer ( Basic Principles for ICT Security in Industrial ICT Systems\u2013In Norwegian), SINTEF Digital. Technical Report."},{"key":"ref_28","unstructured":"NIST (2018). Framework for Improving Critical Infrastructure Cybersecurity."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dworkin, M. (2007). Recommendation for Block Cipher Modes of Operation: Galois\/Counter Mode (GCM) and GMAC, NIST Special Publication 800-38D.","DOI":"10.6028\/NIST.SP.800-38d"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Whiting, D., Housley, R., and Ferguson, N. (2003). Counter with CBC-MAC (CCM), The Internet Society. IETF Request for Comments: 3610.","DOI":"10.17487\/rfc3610"},{"key":"ref_31","first-page":"405","article-title":"The impact of quantum computing on present cryptography","volume":"9","author":"Mavroeidis","year":"2018","journal-title":"Int. J. Adv. Comput. Sci. Appl. (IJACSA)"},{"key":"ref_32","unstructured":"OPC Foundation (2018). OPC 10000-14: OPC Unified Architecture Part 14: PubSub, OPC Foundation."},{"key":"ref_33","unstructured":"Cheswick, B. (1990, January 11\u201315). The design of a secure internet gateway. Proceedings of the USENIX Summer Conference, Anaheim, CA, USA."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1169","DOI":"10.1007\/s11277-021-09055-1","article-title":"Zero-Trust Principles for Legacy Components","volume":"121","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Rose, S.W., Borchert, O., Mitchell, S., and Connelly, S. (2020). Zero Trust Architecture, NIST Special Publication 800-207.","DOI":"10.6028\/NIST.SP.800-207"}],"container-title":["Journal of Cybersecurity and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2624-800X\/2\/1\/3\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:18:07Z","timestamp":1760134687000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2624-800X\/2\/1\/3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,12]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["jcp2010003"],"URL":"https:\/\/doi.org\/10.3390\/jcp2010003","relation":{},"ISSN":["2624-800X"],"issn-type":[{"value":"2624-800X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,12]]}}}