4.6 Article

Cyber Risk Assessment and Optimization: A Small Business Case Study

Related references

Note: Only part of the references are listed.
Proceedings Paper Computer Science, Hardware & Architecture

Optimising user security recommendations for AI-powered smart-homes

Emma Scott et al.

Summary: Research has shown that smart-home occupants often lack cybersecurity awareness. This paper explores potential threats in AI-powered smart-homes and identifies a list of cybersecurity controls required to mitigate their potential impact. The use of optimization methods improves risk minimization compared to random selection approaches.

2022 5TH IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (IEEE DSC 2022) (2022)

Article Computer Science, Information Systems

HoneyCar: A Framework to Configure Honeypot Vulnerabilities on the Internet of Vehicles

Sakshyam Panda et al.

Summary: The Internet of Vehicles (IoV) is a connected car system where vehicles communicate with each other and with road infrastructure. It brings socio-economic benefits but also new cyber-physical threats. Honeypots can be used to gather data on attackers and deceive them by strategically configuring them to represent components of the IoV. This study presents HoneyCar, a decision support framework for honeypot deception in IoV, that utilizes known vulnerabilities to compute optimal honeypot configurations.

IEEE ACCESS (2022)

Article Computer Science, Artificial Intelligence

Bayesian Stackelberg games for cyber-security decision support

Yunxiao Zhang et al.

Summary: This decision support system for cyber-security utilizes preventive optimization, learning mechanisms, and online optimization to select security controls to counteract multi-stage attacks, proving to be more efficient and providing significant security improvements.

DECISION SUPPORT SYSTEMS (2021)

Article Chemistry, Analytical

Game-Theoretic Decision Support for Cyber Forensic Investigations

Antonia Nisioti et al.

Summary: This study investigates the interaction between cyber forensic investigators and strategic attackers using a game-theoretic framework to identify the optimal investigating policy. The model is evaluated through a realistic case study comparing the performance of different investigative methods and types of attackers.

SENSORS (2021)

Article Chemistry, Analytical

Automated Cyber and Privacy Risk Management Toolkit

Gustavo Gonzalez-Granadillo et al.

Summary: Addressing cyber and privacy risks is crucial for organizations, requiring the integration of multiple risk sources and software tools for comprehensive risk assessment and mitigation. While cyber risk assessment focuses on vulnerabilities and threats to assets, privacy impact assessment aims to detect privacy-specific threats and ensure compliance with data protection laws.

SENSORS (2021)

Article Computer Science, Theory & Methods

Data-Driven Decision Support for Optimizing Cyber Forensic Investigations

Antonia Nisioti et al.

Summary: Cyber attacks with multiple attack actions pose challenges to forensic investigations, where investigators must rely on experience and training to choose the next steps. By applying constrained optimization techniques, the efficiency in selecting the next step can be improved, impacting the overall cost of the investigation.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2021)

Article Engineering, Industrial

A budgeted maximum multiple coverage model for cybersecurity planning and management

Kaiyue Zheng et al.

IISE TRANSACTIONS (2019)

Article Computer Science, Information Systems

Post-incident audits on cyber insurance discounts

Sakshyam Panda et al.

COMPUTERS & SECURITY (2019)

Article Management

Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs

M. H. R. Khouzani et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2019)

Article Computer Science, Information Systems

An Options Approach to Cybersecurity Investment

Michail Chronopoulos et al.

IEEE ACCESS (2018)

Proceedings Paper Computer Science, Information Systems

An Enhanced Cyber Attack Attribution Framework

Nikolaos Pitropakis et al.

TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (2018)

Article Information Science & Library Science

Real Options Models for Proactive Uncertainty-Reducing Mitigations and Applications in Cybersecurity Investment Decision Making

Michel Benaroch

INFORMATION SYSTEMS RESEARCH (2018)

Article Computer Science, Hardware & Architecture

A resource allocation framework for adaptive video streaming over LTE

Satish Kumar et al.

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS (2017)

Review Computer Science, Information Systems

A review of cyber security risk assessment methods for SCADA systems

Yulia Cherdantseva et al.

COMPUTERS & SECURITY (2016)

Article Computer Science, Artificial Intelligence

Decision support approaches for cyber security investment

Andrew Fielder et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Hardware & Architecture

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Hussain M. J. Almohri et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2016)

Article Business, Finance

The impact of information sharing on cybersecurity underinvestment: A real options perspective

Lawrence A. Gordon et al.

JOURNAL OF ACCOUNTING AND PUBLIC POLICY (2015)

Article Public, Environmental & Occupational Health

Concerns, Challenges, and Directions of Development for the Issue of Representing Uncertainty in Risk Assessment

Roger Flage et al.

RISK ANALYSIS (2014)

Article Automation & Control Systems

Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks

Saurabh Amin et al.

IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY (2013)