2015
DOI: 10.1016/j.ress.2014.10.006
|View full text |Cite
|
Sign up to set email alerts
|

Development of a cyber security risk model using Bayesian networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
37
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 84 publications
(38 citation statements)
references
References 14 publications
0
37
0
1
Order By: Relevance
“…In short, we find that ICT systems essentially consist of a layered ecosystem of technologies and hardware that have many security vulnerabilities whose source or number may be impossible to assess (e.g. Shin et al, 2015;Trippel et al, 2017). Under these circumstances, the state of cyber security can be described as being in a ''shameful state of unpreparedness'' (Arquilla, 2017, p. 10).…”
Section: The Problem Of Software For Iotmentioning
confidence: 99%
“…In short, we find that ICT systems essentially consist of a layered ecosystem of technologies and hardware that have many security vulnerabilities whose source or number may be impossible to assess (e.g. Shin et al, 2015;Trippel et al, 2017). Under these circumstances, the state of cyber security can be described as being in a ''shameful state of unpreparedness'' (Arquilla, 2017, p. 10).…”
Section: The Problem Of Software For Iotmentioning
confidence: 99%
“…CPSs reliance on digitalization and remote control systems increases their exposure to cyber attacks to controllers, databases, networks and human-system interfaces, that can result in the loss of system integrity and/or functionality. Malicious activities can be manifested as Denial of Service (DoS) attacks [156,208,214], False Data Injection (FDI) attacks (e.g., packet/data modification) [111,128,179], network scan and sniffing attacks [156,182], integrity attacks (e.g., through malware contagion) [139,140] and, illegal command executions [172]. They can be initiated in the cyber domain through local or remote accesses, mimicking the components failures but isolating the connectivity between cyber and physical systems, leaving the physical process uncontrolled and possibly drifting towards severe consequences.…”
Section: Safety and Security Of Cyber-physical Systemsmentioning
confidence: 99%
“…CPSs reliance on digitalization and remote control systems increases their exposure to cyber attacks to controllers, databases, networks and human-system interfaces, that can result in the loss of system integrity and/or functionality. Malicious activities can be manifested as Denial of Service (DoS) attacks (Zargar et al, 2013;Yuan et al, 2013;Rahman et al, 2016), False Data Injection (FDI) attacks (e.g., packet/data modification) (Liang et al, 2017;Tan et al, 2017;Mohammadpourfard et al, 2017), network scan & sniffing attacks (Trabelsi and Rahmani, 2005;Rahman et al, 2016), integrity attacks (e.g., through malware contagion) (Ntalampiras, 2015;Ntalampiras, 2016) and, illegal command executions (Shin et al, 2015). They can be initiated in the cyber domain through local or remote accesses, mimicking the components failures but isolating the connectivity between cyber and physical systems, leaving the physical process uncontrolled and possibly drifting towards severe consequences.…”
Section: Threatsmentioning
confidence: 99%