2017
DOI: 10.1109/mitp.2017.3680959
|View full text |Cite
|
Sign up to set email alerts
|

Security Risk Assessment in Internet of Things Systems

Abstract: Cybersecurity risk assessment approaches have served us well over the last decade. They have provided a platform through which organisations and governments could better protect themselves against pertinent risks. As the complexity, pervasiveness and automation of technology systems increases however, particularly with the Internet of Things (IoT), there is a strong argument for the need for new approaches to assess risk and build trust. The challenge with simply extending existing assessment methodologies to … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
124
0
4

Year Published

2018
2018
2019
2019

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 158 publications
(128 citation statements)
references
References 5 publications
0
124
0
4
Order By: Relevance
“…Most critical infrastructure protection implementations are typically based on risk management frameworks conceived as national or global standards [3]. Risk management approaches often vary either by; the nature of approach, or by how risk is measured [29], [30].…”
Section: Risk Managementmentioning
confidence: 99%
“…Most critical infrastructure protection implementations are typically based on risk management frameworks conceived as national or global standards [3]. Risk management approaches often vary either by; the nature of approach, or by how risk is measured [29], [30].…”
Section: Risk Managementmentioning
confidence: 99%
“…Existing cyber risk assessment models [13][14][15][16][17][18][19] ignore the risk impacts of sharing infrastructure and the cyber risk estimated loss range variously 1 . Further cyber risk assessment challenges emerge from compiling of connected systems devices and platforms 4,20 . The machines are becoming social CPS [21][22][23] operating as real-time IoT systems of systems 24,25 , creating cyber risk from data in transit.…”
Section: Current State Of Cyber Riskmentioning
confidence: 99%
“…IoT's 'dual use ability' (i.e., sold for one purpose but misused for another) is particularly relevant. Just as botnets (P18) highlight the failure of current risk assessments to consider assets themselves as an attack platform [26], future threat scenarios may also include the repurposing of IoT systems including generated data for usages than those they were originally intended for (Christopher Bull).…”
Section: Crime and Exploitationmentioning
confidence: 99%