2019
DOI: 10.20944/preprints201903.0104.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber Risk in IoT Systems

Abstract: In this paper we present an understanding of cyber risks in the Internet of Things (IoT), we explain why it is important to understand what IoT cyber risks are and how we can use risk assessment and risk management approaches to deal with these challenges. We introduce the most effective ways of doing Risk assessment and Risk Management of IoT risk. As part of our research, we also developed methodologies to assess and manage risk in this emerging environment.  This paper will take you through our res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
2

Relationship

4
5

Authors

Journals

citations
Cited by 20 publications
(15 citation statements)
references
References 17 publications
(25 reference statements)
0
15
0
Order By: Relevance
“…To define a transformation roadmap for standardisation of IoT risk impact assessment, the methodology follows established approaches [122][123][124][125][126][127][128] and few recently developed design processes 122,[129][130][131][132][133][134][135][136][137] .The following section performs strengths, weaknesses, opportunities and threats (SWOT) analysis. This diversity of approaches identified in the gap analysis, presents conflict in risk assessment, e.g.…”
Section: Transformation Roadmap For Standardisation Of Iot Risk Impacmentioning
confidence: 99%
“…To define a transformation roadmap for standardisation of IoT risk impact assessment, the methodology follows established approaches [122][123][124][125][126][127][128] and few recently developed design processes 122,[129][130][131][132][133][134][135][136][137] .The following section performs strengths, weaknesses, opportunities and threats (SWOT) analysis. This diversity of approaches identified in the gap analysis, presents conflict in risk assessment, e.g.…”
Section: Transformation Roadmap For Standardisation Of Iot Risk Impacmentioning
confidence: 99%
“…This becomes clearly visible in Table 2. This variety of approaches presents conflict in risk assessment 4,5,14,[32][33][34][35][36][6][7][8][9][10][11][12][13] . To avoid such conflicts, the core cyber impact assessment concepts are extracted to defining the design principles for cyber risk impact assessment from IoT in the digital economy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Additional research is required to integrate the knowledge from other risk assessment approaches. This research is conducted already and the aim is to publish the findings in a series of papers 3,4,13,14,20,[27][28][29][30][31][32][33]5,[34][35][36][37]43,44,[6][7][8][9][10][11][12] .…”
Section: Limitations and Further Researchmentioning
confidence: 99%
“…The gaps and key factors in current technological trends for I4.0 supply chain design integrating IIoT principles were derived from the taxonomic review [1], [3], [27], [41], [42], [44]- [47], [19]- [26]. These are analysed through a case study of I4.0 frameworks in the current section.…”
Section: Case Study Of Five Leading I40 Initiatives and Their Technomentioning
confidence: 99%