2019
DOI: 10.20944/preprints201904.0133.v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cyber Risk Management for the Internet of Things

Abstract: The Internet-of-Things (IoT) enables enterprises to obtain profits from data but triggers data protection questions and new types of cyber risk. Cyber risk regulations for the IoT however do not exist. The IoT risk is not included in the cyber security assessment standards, hence, often not visible to cyber security experts. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. The outcome of such self-assessment need to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
15
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(16 citation statements)
references
References 90 publications
(138 reference statements)
1
15
0
Order By: Relevance
“…This research is part of research paper series related to this topic (Nicolescu, Huth, Radanliev, & De Roure, 2018b;Nurse, Radanliev, Creese, & De Roure, 2018;Petar Radanliev, 2019a, 2019b, 2014, 2015a, 2015c, 2015b, 2016Petar Radanliev et al, 2019;Petar Radanliev, Charles De Roure, Nurse, Burnap, & Montalvo, 2019;Petar Radanliev et al, 2019…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…This research is part of research paper series related to this topic (Nicolescu, Huth, Radanliev, & De Roure, 2018b;Nurse, Radanliev, Creese, & De Roure, 2018;Petar Radanliev, 2019a, 2019b, 2014, 2015a, 2015c, 2015b, 2016Petar Radanliev et al, 2019;Petar Radanliev, Charles De Roure, Nurse, Burnap, & Montalvo, 2019;Petar Radanliev et al, 2019…”
Section: Resultsmentioning
confidence: 99%
“…; PetarRadanliev, Rowlands, & Thomas, 2014; Petar Radanliev, De Roure, Nurse, Montalvo, & Burnap, 2019a, 2019b Petar Radanliev, De Roure, Cannady, et al, 2019)(Nicolescu, Huth, Radanliev, & De Roure, 2018a; Petar Radanliev, De Roure, Nurse, Rafael, & Burnap, 2019; Petar Radanliev et al, 2019Taylor, P., Allpress, S., Carr, M., Lupu, E., Norton, J., Smith et al, 2018).…”
mentioning
confidence: 99%
“…Over-reliance on modelling in cyber insurance can also conceal insidious and difficult to detect processes [5], [26], such as in case of the 'normalization of deviance [4]. From a public policy point of view, it has been argued that insurers became 'de facto regulators' by establishing a minimum-security level to gain cyber coverage [13].…”
Section: Discussion On Estimation and Valuation Of Cyber Risk Insurancementioning
confidence: 99%
“…(4) Awareness and response strategies to common security threats such as Denial of Service, Worms/Trojans, Phishing, web-based and web application attacks, insider threat, exploit kits, information leakage, and identity theft [13], [22]. [23].…”
Section: Incident Response and Recoverymentioning
confidence: 99%
“…The aim of the research is to define how do we understand that we really understand cyber risk assessment. This approach was considered relevant to this question because most cyber security frameworks and methodologies propose answers to a quantitative question with qualitative assessments [3][4][5][6][7][8][9][10] .…”
Section: Methodsmentioning
confidence: 99%