Living in the Internet of Things: Cybersecurity of the IoT - 2018 2018
DOI: 10.1049/cp.2018.0001
|View full text |Cite
|
Sign up to set email alerts
|

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems

Abstract: Security risk assessment methods have served us well over the last two decades. As the complexity, pervasiveness and automation of technology systems increases, particularly with the Internet of Things (IoT), there is a convincing argument that we will need new approaches to assess risk and build system trust. In this article, we report on a series of scoping workshops and interviews with industry professionals (experts in enterprise systems, IoT and risk) conducted to investigate the validity of this argument… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
40
0

Year Published

2018
2018
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 32 publications
(40 citation statements)
references
References 23 publications
0
40
0
Order By: Relevance
“…This research is part of research paper series related to this topic (Nicolescu, Huth, Radanliev, & De Roure, 2018b;Nurse, Radanliev, Creese, & De Roure, 2018;Petar Radanliev, 2019a, 2019b, 2014, 2015a, 2015c, 2015b, 2016Petar Radanliev et al, 2019;Petar Radanliev, Charles De Roure, Nurse, Burnap, & Montalvo, 2019;Petar Radanliev et al, 2019…”
Section: Resultsmentioning
confidence: 99%
“…This research is part of research paper series related to this topic (Nicolescu, Huth, Radanliev, & De Roure, 2018b;Nurse, Radanliev, Creese, & De Roure, 2018;Petar Radanliev, 2019a, 2019b, 2014, 2015a, 2015c, 2015b, 2016Petar Radanliev et al, 2019;Petar Radanliev, Charles De Roure, Nurse, Burnap, & Montalvo, 2019;Petar Radanliev et al, 2019…”
Section: Resultsmentioning
confidence: 99%
“…We consider these three steps as the best process of IoT risk assessment. Figure 1, below, sets this out, and also demonstrates that this is a continuous process [2]. • IoT risk transferthis involves outsourcing the risk to a third-party.…”
Section: Defining What Is Iot Riskmentioning
confidence: 97%
“…Such data input is collected from machines and humans and can be seen as digital assets with economical value [13], [14]. But such connected digital economy that represents a social machine, comes with cyber risks that we do not completely understand [15], [16] and we do not yet have the data to perform risk assessment [6], [17], [18].…”
Section: Economic Impact On the Digital Economy From New Technologiesmentioning
confidence: 99%