2019
DOI: 10.48550/arxiv.1906.10922
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Challenges for Security Assessment of Enterprises in the IoT Era

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…This is likely to enable more practical simulation and algorithmic learning. Furthermore, most reviewed studies use simulations or testbeds for evaluation [7], [13], [14], [15], [16], [20], [21], [23], [26], [29], [33], [35], [37], [39], [44], [51], [54], [67] instead of real-world IoT networks.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
See 1 more Smart Citation
“…This is likely to enable more practical simulation and algorithmic learning. Furthermore, most reviewed studies use simulations or testbeds for evaluation [7], [13], [14], [15], [16], [20], [21], [23], [26], [29], [33], [35], [37], [39], [44], [51], [54], [67] instead of real-world IoT networks.…”
Section: Discussion and Future Directionsmentioning
confidence: 99%
“…Mathov et al [29] propose three novel ideas that address and overcome using attack graphs for vulnerability assessment. The authors review the require solutions when using attack graphs to model and analyze enterprise networks with IoT devices.…”
Section: B Graph Analyses and Formulation Of Security Propertiesmentioning
confidence: 99%
“…Over the years, various methods have been developed as a means of evaluating the security risks associated with the IoT. Among those methods, IoT attack graphs [44], [45], [46] provide a comprehensive view of attacks, and can assist in identifying multi-hop high-risk attack paths in a large-scale environment. A different objective was addressed in [47], where the authors aimed at quantifying the ease of IoT-related attack execution.…”
Section: Risk Assessment In the Iotmentioning
confidence: 99%
“…multi-step attacks that can combine attack steps exploiting human, physical, or cyber vulnerabilities in combination. The security analysis of such systems cannot be done from one perspective alone but must consider the physical context of the system, its cyber resources and connections, and the humans that use or operate it [10]. Threat models for hybrid systems must be able to represent attack scenarios that exploit the interplay between the human, physical, and cyber aspects of the system.…”
Section: Introductionmentioning
confidence: 99%