2022
DOI: 10.53759/7669/jmc202202017
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of the Cyber Security Risk Models (CSRM) in Cloud Computing

Abstract: Many devices in the Internet of Things (IoT) ecosystem may be susceptible to cyberattacks due to their diverse nature and lack of standardization. Resource-constrained IoT devices include sensor nodes, smart gadgets, and wearable devices. An organization's RAP (Risk Assessment Process) integrates the evaluation of hazards that are linked to all its resources, as well as the evaluation and prioritization of these risks. It is crucial to begin the risk management process with an accurate and thorough risk assess… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
references
References 15 publications
0
0
0
Order By: Relevance