2021
DOI: 10.3390/s21186057
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture

Abstract: The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
1
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 15 publications
(6 citation statements)
references
References 35 publications
0
1
0
1
Order By: Relevance
“…In the event of a cybersecurity breach in a third-party partner, superannuation organizations may face significant financial and reputational risks. Breaches that compromise member data can erode trust and credibility, impacting the organization's standing in the financial sector (Masip-Bruin et. al., 2021, Javaheri et.…”
Section: Navigating Cybersecurity Risks In Third-party Engagementsmentioning
confidence: 99%
“…In the event of a cybersecurity breach in a third-party partner, superannuation organizations may face significant financial and reputational risks. Breaches that compromise member data can erode trust and credibility, impacting the organization's standing in the financial sector (Masip-Bruin et. al., 2021, Javaheri et.…”
Section: Navigating Cybersecurity Risks In Third-party Engagementsmentioning
confidence: 99%
“…Firstly, at the architectural level, the RAMOS moves beyond SOTA in the following directions: (i) discard the vertical (hierarchical) offloading where the model and data are coupled as a single entity and must be migrated to a computationally higher node. This horizontally-oriented architectural change aims to deliver a more fine-grained offloading logic, allowing each node or service to offload a portion of its computational burden, thus reducing the overall data transfer; (ii) support the computing continuum carbon-aware scheduling in the cloud-native ecosystem; (iii) address the shortcomings of current solutions on the discovery of fog/edge devices and the integration of the resources of MCU devices providing a standards-compliant solution that supports location-and context-awareness; (iv) tackle the fallbacks of current SLA (service-level agreement) tools, by implementing an automatic, CNCF-driven (cloud native computing foundation) SLA management; (iv) provide a cybersecurity framework based on the principles of decentralized intelligence to harden intelligent applications [53].…”
Section: Contributions Of Ramos Architecturementioning
confidence: 99%
“…O elemento configurado como Plataforma de Compartilhamento de Inteligência de Ameaças (TISPs) é o MISP. O software Suricata e o MISP foram localizados em documentos acadêmicos atuais, sendo este o motivo da escolha (Masip-Bruin et al, 2021) (Mironeanu et al, 2021) (Koloveas et al, 2021). Assim a prova de conceito atende a todos os elementos propostos na metodologia contemplando a coleta, avaliação, enriquecimento, estruturação e compartilhamento dos Indicadores de Ameaças.…”
Section: Tisp: Mispunclassified