2024
DOI: 10.1016/j.cie.2024.109891
|View full text |Cite
|
Sign up to set email alerts
|

Cyber-physical systems security: A systematic review

Houda Harkat,
Luis M. Camarinha-Matos,
João Goes
et al.
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(1 citation statement)
references
References 150 publications
0
1
0
Order By: Relevance
“…Alhuwail et al (2021) recommends "targeted bottom-up approach via personalized outreach, in-person contacts, and frequent announcements throughout the workflow" (Alhuwail et al, 2021). In conjunction with proper training, devices in the healthcare infrastructure's network should be assessed, updated and/or configured properly prior to being introduced to the overall network, especially over time with regards to software life cycles (Otieno et al, 2023;Phiri, 2023;Harkat et al, 2024;Dadkhah et al, 2024). A core principle highlighting the necessity of this approach lies in the notion that a single vulnerability is sufficient for a malicious actor to access, move laterally or gain privileges in a system and that understanding the risk of each vulnerability allows for holistic comprehension and aids security teams as they work toward building resistance.…”
Section: Mitigation and Prevention Strategiesmentioning
confidence: 99%
“…Alhuwail et al (2021) recommends "targeted bottom-up approach via personalized outreach, in-person contacts, and frequent announcements throughout the workflow" (Alhuwail et al, 2021). In conjunction with proper training, devices in the healthcare infrastructure's network should be assessed, updated and/or configured properly prior to being introduced to the overall network, especially over time with regards to software life cycles (Otieno et al, 2023;Phiri, 2023;Harkat et al, 2024;Dadkhah et al, 2024). A core principle highlighting the necessity of this approach lies in the notion that a single vulnerability is sufficient for a malicious actor to access, move laterally or gain privileges in a system and that understanding the risk of each vulnerability allows for holistic comprehension and aids security teams as they work toward building resistance.…”
Section: Mitigation and Prevention Strategiesmentioning
confidence: 99%