4.6 Article

A Survey on Cyber Risk Management for the Internet of Things

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Threat Modeling and Risk Analysis for Miniaturized Wireless Biomedical Devices

Vladimir Vakhter et al.

Summary: With the proliferation of proactive mobile healthcare, the landscape of miniaturized wireless biomedical devices (MWBDs) is rapidly expanding. However, the adoption of these technologies poses privacy and security risks to their users. Therefore, ensuring the security of MWBDs is crucial, and threat modeling is the first step in this process.

IEEE INTERNET OF THINGS JOURNAL (2022)

Editorial Material Chemistry, Analytical

Next-Generation Internet of Things (IoT): Opportunities, Challenges, and Solutions

Yousaf Bin Zikria et al.

SENSORS (2021)

Article Computer Science, Artificial Intelligence

Bayesian Stackelberg games for cyber-security decision support

Yunxiao Zhang et al.

Summary: This decision support system for cyber-security utilizes preventive optimization, learning mechanisms, and online optimization to select security controls to counteract multi-stage attacks, proving to be more efficient and providing significant security improvements.

DECISION SUPPORT SYSTEMS (2021)

Article Chemistry, Multidisciplinary

Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation

Aaron Echeverria et al.

Summary: The study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. It proposed a methodology to evaluate the security level of an IoT solution using a checklist that considers security aspects in the three layers of the IoT architecture, and established a risk matrix adapted to IoT to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis was proposed to reduce the attack surface and improve the security level of the IoT solution.

APPLIED SCIENCES-BASEL (2021)

Review Chemistry, Analytical

Influence of Human Factors on Cyber Security within Healthcare Organisations: A Systematic Review

Sokratis Nifakos et al.

Summary: With the increasing concern of cybersecurity in healthcare, it is crucial for healthcare organizations to enhance staff awareness and training to strengthen cyber defense strategies. The literature highlights the evolving nature of cyber threats and the importance of adopting cybersecurity practices among healthcare professionals.

SENSORS (2021)

Proceedings Paper Computer Science, Information Systems

Asset-Driven Approach for Security Risk Assessment in IoT Systems

Salim Chehida et al.

Summary: The growth of security issues in IoT-based systems highlights the need for a rigorous methodology to assess risks and protect the system. In this work, we propose an approach that follows security standards to identify and analyze potential risks, starting from specifying system assets and threats, and defining security objectives, technical requirements, and countermeasures. We apply this approach to an IoT system for monitoring and controlling the urban water cycle.

RISKS AND SECURITY OF INTERNET AND SYSTEMS (CRISIS 2020) (2021)

Proceedings Paper Computer Science, Theory & Methods

Automated Security Assessment for the Internet of Things

Xuanyu Duan et al.

Summary: The study introduces an automated security assessment framework for IoT networks, leveraging machine learning and natural language processing to analyze vulnerability descriptions and assess network security through a two-layered graphical security model. Evaluation demonstrates the framework's effectiveness in automatically predicting vulnerability metrics and identifying attack paths with high accuracy.

2021 IEEE 26TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2021) (2021)

Proceedings Paper Computer Science, Interdisciplinary Applications

An Assurance-Based Risk Management Framework for Distributed Systems

Marco Anisetti et al.

Summary: The emergence of cloud computing and Internet of Things has drastically changed IT systems, requiring new risk management frameworks to adapt to the complexity of modern systems. The proposed assurance-based risk management framework, integrating risk monitoring and risk mitigation computation, is suitable for modern distributed systems.

2021 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, ICWS 2021 (2021)

Article Engineering, Electrical & Electronic

Cybersecurity Risk Assessment in Smart City Infrastructures

Maxim Kalinin et al.

Summary: The article focuses on cybersecurity risk assessment of dynamic device-to-device networks in a smart city, highlighting modern security threats and proposing a new method based on object typing, data mining, and quantitative risk assessment.

MACHINES (2021)

Article Computer Science, Information Systems

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

Zuoguang Wang et al.

Summary: This paper introduces a conceptual model to describe how social engineering attacks work, identifying core entities and aspects to understand the success of these attacks. It also offers materials for security awareness training and future empirical research, as well as aiding in the development of a domain ontology of social engineering in cybersecurity.

IEEE ACCESS (2021)

Article Computer Science, Information Systems

Coping with the New Normal Imposed by the COVID-19 Pandemic: Lessons for Technology Management and Governance

Tejaswini Herath et al.

INFORMATION SYSTEMS MANAGEMENT (2020)

Proceedings Paper Computer Science, Theory & Methods

Threats Classification Method for the Transport Infrastructure of a Smart City

Konstantin Izrailov et al.

2020 IEEE 14TH INTERNATIONAL CONFERENCE ON APPLICATION OF INFORMATION AND COMMUNICATION TECHNOLOGIES (AICT2020) (2020)

Proceedings Paper Computer Science, Information Systems

An Internet of Things (IoT) Security Assessment for Households

William Aiken et al.

2020 INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND ASSURANCE (ICSSA 2020) (2020)

Proceedings Paper Computer Science, Interdisciplinary Applications

An ISO-compliant Test Procedure for Technical Risk Analyses of IoT Systems based on STRIDE

Peter Danielis et al.

2020 IEEE 44TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE (COMPSAC 2020) (2020)

Proceedings Paper Computer Science, Information Systems

Automatic security management of smart infrastructures using attack graph and risk analysis

Denis Ivanov et al.

PROCEEDINGS OF THE 2020 FOURTH WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4 2020) (2020)

Review Computer Science, Information Systems

Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management

In Lee

FUTURE INTERNET (2020)

Article Computer Science, Information Systems

IoT cyber risk: a holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process

Kamalanathan Kandasamy et al.

EURASIP JOURNAL ON INFORMATION SECURITY (2020)

Article Computer Science, Information Systems

Identifying the attack surface for IoT network

Syed Rizvi et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Threat model for securing internet of things (IoT) network at device-level

Syed Rizvi et al.

INTERNET OF THINGS (2020)

Article Computer Science, Information Systems

Apparatus: A framework for security analysis in internet of things systems

Orestis Mavropoulos et al.

AD HOC NETWORKS (2019)

Article Health Care Sciences & Services

Secure and Scalable mHealth Data Management Using Blockchain Combined With Client Hashchain: System Design and Validation

Tomomitsu Motohashi et al.

JOURNAL OF MEDICAL INTERNET RESEARCH (2019)

Article Computer Science, Information Systems

Cyber risk assessment in cloud provider environments: Current models and future needs

Olusola Akinrolabu et al.

COMPUTERS & SECURITY (2019)

Article Management

Scalable min-max multi-objective cyber-security optimisation over probabilistic attack graphs

M. H. R. Khouzani et al.

EUROPEAN JOURNAL OF OPERATIONAL RESEARCH (2019)

Article Computer Science, Information Systems

Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things

Gemini George et al.

PERVASIVE AND MOBILE COMPUTING (2019)

Article Computer Science, Information Systems

Energy Theft Detection With Energy Privacy Preservation in the Smart Grid

Donghuan Yao et al.

IEEE INTERNET OF THINGS JOURNAL (2019)

Article Computer Science, Information Systems

Threat Analysis for Smart Homes

Georgios Kavallieratos et al.

FUTURE INTERNET (2019)

Article Computer Science, Information Systems

Threat Analysis for Wearable Health Devices and Environment Monitoring Internet of Things Integration System

Tzu Wei Tseng et al.

IEEE ACCESS (2019)

Article Computer Science, Information Systems

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues

Pardeep Kumar et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2019)

Article Computer Science, Information Systems

A taxonomy of cyber-physical threats and impact in the smart home

Ryan Heartfield et al.

COMPUTERS & SECURITY (2018)

Article Computer Science, Information Systems

A Graph-Based Security Framework for Securing Industrial IoT Networks from Vulnerability Exploitations

Gemini George et al.

IEEE ACCESS (2018)

Article Chemistry, Multidisciplinary

Future of IoT Networks: A Survey

Suk Kyu Lee et al.

APPLIED SCIENCES-BASEL (2017)

Proceedings Paper Automation & Control Systems

IoT Security Framework for Smart Water System

Jesus Pacheco et al.

2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA) (2017)

Proceedings Paper Computer Science, Theory & Methods

Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment

Faisal Alsubaei et al.

2017 IEEE 42ND CONFERENCE ON LOCAL COMPUTER NETWORKS WORKSHOPS (LCN WORKSHOPS 2017) (2017)

Article Computer Science, Artificial Intelligence

Decision support approaches for cyber security investment

Andrew Fielder et al.

DECISION SUPPORT SYSTEMS (2016)

Article Computer Science, Information Systems

The Behavioral Roots of Information Systems Security: Exploring Key Factors Related to Unethical IT Use

Sutirtha Chatterjee et al.

JOURNAL OF MANAGEMENT INFORMATION SYSTEMS (2015)

Review Computer Science, Interdisciplinary Applications

Security and privacy in electronic health records: A systematic literature review

Jose Luis Fernandez-Aleman et al.

JOURNAL OF BIOMEDICAL INFORMATICS (2013)

Article Computer Science, Information Systems

A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements

Mina Deng et al.

REQUIREMENTS ENGINEERING (2011)

Article Psychology, Social

Power, risk, and the status quo: Does power promote riskier or more conservative decision making?

Jon K. Maner et al.

PERSONALITY AND SOCIAL PSYCHOLOGY BULLETIN (2007)