2022
DOI: 10.3390/s22062126
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Model for Vulnerability Analysis through Enhanced Directed Graphs and Quantitative Metrics

Abstract: The rapid evolution of industrial components, the paradigm of Industry 4.0, and the new connectivity features introduced by 5G technology all increase the likelihood of cybersecurity incidents. Such incidents are caused by the vulnerabilities present in these components. Designing a secure system is critical, but it is also complex, costly, and an extra factor to manage during the lifespan of the component. This paper presents a model to analyze the known vulnerabilities of industrial components over time. The… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 81 publications
0
3
0
Order By: Relevance
“…The secondary data availability is also a limitation of this part of study. The newest and most reliable data related to the numbers of registered electric vehicles are from the end of 2021 [141,142]. There are other questions opened by the provided analyses, related to the energy generation and consumption.…”
Section: Discussionmentioning
confidence: 99%
“…The secondary data availability is also a limitation of this part of study. The newest and most reliable data related to the numbers of registered electric vehicles are from the end of 2021 [141,142]. There are other questions opened by the provided analyses, related to the energy generation and consumption.…”
Section: Discussionmentioning
confidence: 99%
“…The second methodology used was the common vulnerability score system, CVSS (2.2), adopted for prioritizing the severity of the potential impact of vulnerabilities. This tool provides a systematic approach to assessing the severity of vulnerabilities using weights [61] ranging from zero to three (no severity and high severity, respectively) and is commonly used with other methodologies such as common vulnerabilities exposure (CVE) [62][63][64]. Therefore, due to not being a tool that classifies or proposes attack vectors, it is very commonly used in conjunction with other threat modeling methodologies (TMMs) during the threat assessment process in a project.…”
mentioning
confidence: 99%
“…Focusing on Industrial components that are the main parts of critical infrastructures the authors in [ 8 ] propose a model for vulnerability analysis through the their entire life-cycle. The model can Identify the root causes and nature of vulnerabilities for the industrial components.…”
mentioning
confidence: 99%