2022
DOI: 10.1016/j.jisa.2021.103050
|View full text |Cite
|
Sign up to set email alerts
|

Assessing cyber threats for storyless systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…Through converting information into intelligence and developing cyber security knowledge, a formalized approach to cyber threat intelligence (CTI) will materialize. Hence, threat actors need to be identified and categorized and this can be conducted by means of a threat template that outlines the opportunities in relation to the selected threat actors [64] (p. 6). By establishing the motivations of threat actors and linking through with their intended actions, it should be possible to understand the nature of the threat(s) and how matters escalate and an impact occurs [64] (p. 8).…”
Section: Discussionmentioning
confidence: 99%
“…Through converting information into intelligence and developing cyber security knowledge, a formalized approach to cyber threat intelligence (CTI) will materialize. Hence, threat actors need to be identified and categorized and this can be conducted by means of a threat template that outlines the opportunities in relation to the selected threat actors [64] (p. 6). By establishing the motivations of threat actors and linking through with their intended actions, it should be possible to understand the nature of the threat(s) and how matters escalate and an impact occurs [64] (p. 8).…”
Section: Discussionmentioning
confidence: 99%
“…The Open Web Application Security Project (OWASP) also uses technical and perspective to determine the level of threat [16], [17]. That perspective is represented by metrics such as financial loss, reputation damage, number of affected users, loss of CIA (Confidentiality, Integrity, Availability) factors, etc.…”
Section: Fig 1 the Metrics Of Cvssmentioning
confidence: 99%
“…We extend the UMLmodels from the SCT descriptions with attack scenarios, as depicted in the lock system example in figure 10. Once we have explored the attack space, we can give a qualitative likelihood estimation [15], [16] for the threats based on based on weighted averages of 1) the size of the group of potential threat actors, 2) how favorable the circumstances are for an attack, e.g., spatial opportunity (is the location of…”
Section: Safety and Security Analysismentioning
confidence: 99%