首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge
Authors:Radanliev  Petar  De Roure  David  Van Kleek  Max  Ani  Uchenna  Burnap  Pete  Anthi  Eirini  Nurse  Jason R C  Santos  Omar  Montalvo  Rafael Mantilla  Maddox  La’Treall
Institution:1.Oxford e-Research Centre, Department of Engineering Sciences, University of Oxford, Oxford, UK
;2.STEaPP, Faculty of Engineering Science, University College London, London, UK
;3.School of Computer Science and Informatics, Cardiff University, Cardiff, UK
;4.School of Computing, University of Kent, Canterbury, UK
;5.Cisco Research Centre, Research Triangle Park, Durham, NC, USA
;
Abstract:

The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.

Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号