2016 IEEE International Smart Cities Conference (ISC2) 2016
DOI: 10.1109/isc2.2016.7580812
|View full text |Cite
|
Sign up to set email alerts
|

Automatic assets identification for smart cities: Prerequisites for cybersecurity risk assessments

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…These key assets need to be integrated within the smart city infrastructure and maintained to ensure systems are not degraded and valuable services are operable. The study by Waedt et al (2016) focused on the manual and automatic asset identification, annotation and tracking of graded Application Security Controls (ASCs) that can benefit from comprehensive and formalized asset management. This included the availability and integrity of fixed and mobile technology assets and the reliability and integrity of software assets installed on servers and cloud environments.…”
Section: Smart City Infrastructurementioning
confidence: 99%
See 1 more Smart Citation
“…These key assets need to be integrated within the smart city infrastructure and maintained to ensure systems are not degraded and valuable services are operable. The study by Waedt et al (2016) focused on the manual and automatic asset identification, annotation and tracking of graded Application Security Controls (ASCs) that can benefit from comprehensive and formalized asset management. This included the availability and integrity of fixed and mobile technology assets and the reliability and integrity of software assets installed on servers and cloud environments.…”
Section: Smart City Infrastructurementioning
confidence: 99%
“…This included the availability and integrity of fixed and mobile technology assets and the reliability and integrity of software assets installed on servers and cloud environments. The Waedt et al (2016) study asserts that rigorous and pervasive asset management provides value beyond security to mitigate the misuse of assets for sophisticated attacks targeting combinations of version-specific vulnerabilities.…”
Section: Smart City Infrastructurementioning
confidence: 99%
“…However, the fuzzy RAMCAP considers the relative importance among vulnerability, threat, and consequence but not the relevant goals for the assets. The authors in [39] focus on the manual and automatic asset identification, annotation and tracking, as well as on the assignment of graded application security controls (ASCs), that can benefit from a comprehensive and formalised asset management. However, this process is not feasible in a heavily regulated business domain and can easily be a target to threat actors leading to a cyber-attack.…”
Section: Comparison With the Other Study Resultsmentioning
confidence: 99%
“…Other researchers employed special‐purpose tools to evaluate their proposed techniques: Cyber Security Argument Graph Evaluation (CyberSAGE) tool, 87 Smart Grid Information Security (SGIS) Toolbox, 116 and network application tool (NetAPT) 117 . Some authors used manual risk assessment 118,119 and compared their results generated through computer‐aided tools. For manual risk assessment, the techniques used are risk matrix, where for each identified risk value of H (High), M (Medium), and L (Low) is assigned by the professionals during meetings or group sessions 120 …”
Section: Findings Of Our Reviewmentioning
confidence: 99%