2014
DOI: 10.1016/j.jisa.2014.04.002
|View full text |Cite
|
Sign up to set email alerts
|

Automating the assessment of ICT risk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(5 citation statements)
references
References 32 publications
0
5
0
Order By: Relevance
“…This work integrates the results outlined in [1,2] and presents them systematically. Furthermore, it applies the suite tools to assess and manage the ICT risk of two ICSs, each supervising a distinct power generation plant.…”
Section: Introductionmentioning
confidence: 82%
See 1 more Smart Citation
“…This work integrates the results outlined in [1,2] and presents them systematically. Furthermore, it applies the suite tools to assess and manage the ICT risk of two ICSs, each supervising a distinct power generation plant.…”
Section: Introductionmentioning
confidence: 82%
“…To this purpose, it classifies v by matching some predefined patterns against the description of v in the Common Vulnerability Enumeration, CVE, database [23], a de facto standard [1]. The class of v determines the attributes of each attack at it enables such as succðatÞ and timeðatÞ.…”
Section: Modeling An Ict Systemmentioning
confidence: 99%
“…A vulnerability is defined as a defect in a component or an erroneous or malicious behavior performed by a user. 6 The Common Vulnerability Scoring System (CVSS) rates all known vulnerabilities in terms of their severity on a scale from 1 to 10; higher scores indicate an increased probability of exploitation. 7 CVSS version 3 scores are assigned using four metrics: the access vector (AV), access complexity (AC), privileges required (PReq), and user interaction (UI).…”
Section: Network Riskmentioning
confidence: 99%
“…For instance, [18] Presents Monte Carlo simulation method for evaluating and communicating security investment benefits and to understand technology choices in a financial manner. In [33], the authors describe probabilistic risk assessment to ICT systems, through scenario-based estimation of agent attack plan and risk impact. Then applies Monte Carlo for detailed simulation of threat agents' behaviour to support assessment through statistical evaluation of risk.…”
Section: Related Workmentioning
confidence: 99%