2023
DOI: 10.1016/j.cose.2022.102950
|View full text |Cite
|
Sign up to set email alerts
|

Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8
2

Relationship

0
10

Authors

Journals

citations
Cited by 24 publications
(15 citation statements)
references
References 20 publications
0
2
0
Order By: Relevance
“…Theory suggests "Reducing the opportunities for cybercrime to occur, making cybercrime more difficult to commit and by increasing the risks of detection and punishment associated with committing cybercrime" (Choo 2011, 719). Scholars mentioned "cyber threat modelling" as "an analytical process that is used for identifying the potential threats against a system and supporting the selection of security requirements in the early stages of the system development life cycle" (Mamdouh Khalil et al 2023).…”
Section: Methodology and Theoretical Frameworkmentioning
confidence: 99%
“…Theory suggests "Reducing the opportunities for cybercrime to occur, making cybercrime more difficult to commit and by increasing the risks of detection and punishment associated with committing cybercrime" (Choo 2011, 719). Scholars mentioned "cyber threat modelling" as "an analytical process that is used for identifying the potential threats against a system and supporting the selection of security requirements in the early stages of the system development life cycle" (Mamdouh Khalil et al 2023).…”
Section: Methodology and Theoretical Frameworkmentioning
confidence: 99%
“…Here, the authors examined the benefits of Software-Defined Networking (SDN) in creating coordinated intrusion response plans for ICS and provided a taxonomy of intrusion response plans. The adaptation of threat modeling for ICSs is summarized by Khalil et al [56] through comprehensive literature evaluation, provided their vulnerability to cyberattacks that can have severe consequences. The study emphasizes the significance of strategic frameworks covering security, privacy, and improved validation metrics in ICS threat modeling approaches.…”
Section: Volume mentioning
confidence: 99%
“…Cyber-physical systems, in contrast to software-based ones, have a wider range of hardware, software, and communication components that perform a physical task, necessitating the involvement of a wider range of stakeholder groups, such as operators dealing with physical processes or more heterogeneous development teams with different backgrounds in addition to IT or OT system operators. Consequently, threat modelling techniques, which have primarily been created for software, should be modified to account for the stakeholder structure of CPS systems [11]. Threat models are methods or frameworks for identifying, analysing, and proposing security control countermeasures for threats and their capabilities.…”
Section: Related Workmentioning
confidence: 99%