2019
DOI: 10.1007/978-3-319-95597-1_2
|View full text |Cite
|
Sign up to set email alerts
|

Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…The adoption of models can increase confidence and completeness in risk assessment, provide formal support for a more objective evaluation and documentation of the risk assessment rationale through reviewable artefacts and support change management through traceability of risks to design elements [28]. However, the results of the security evaluation are usually considered only during the design phase to validate or certify the security of the CPS, missing very valuable information that reports the security flaws that the system has and how they could be avoided during the system's operation phase.…”
Section: Underestimated Security Assessment Resultsmentioning
confidence: 99%
“…The adoption of models can increase confidence and completeness in risk assessment, provide formal support for a more objective evaluation and documentation of the risk assessment rationale through reviewable artefacts and support change management through traceability of risks to design elements [28]. However, the results of the security evaluation are usually considered only during the design phase to validate or certify the security of the CPS, missing very valuable information that reports the security flaws that the system has and how they could be avoided during the system's operation phase.…”
Section: Underestimated Security Assessment Resultsmentioning
confidence: 99%
“…Rocchetto et al [48] performed a cost/benefit trade-off analysis to justify the necessary costs implied by the corresponding countermeasures and the adoption of specific security requirements. ey proposed two different costs, the cost for the attackers and the cost to mitigate the vulnerability.…”
Section: Designed-rule-based Approachmentioning
confidence: 99%
“…Risk Analysis includes a review of identified risks to provide a quantitative estimate for the likelihood of a specific risk and the related impact on assets [77]. During risk evaluation, each risk is compared against an evaluation criteria, where risks are measured against security requirements indicating the required security measures' [79,77]. This is Table 1.7 ISO 27001:2013 provides a standard framework for information security management, where risk assessment is characterized by three activities: identification, analysis and evaluation.…”
Section: Risk Assessmentmentioning
confidence: 99%