2015
DOI: 10.1016/j.promfg.2015.09.060
|View full text |Cite
|
Sign up to set email alerts
|

Framework for Identifying Cybersecurity Risks in Manufacturing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
18
0
1

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(19 citation statements)
references
References 5 publications
0
18
0
1
Order By: Relevance
“…Risk can be defined as the possibility of something bad happening [12]. Threat can be defined as an action or event which occur naturally or intentionally and has the potential to harm information, property, people, and the environment [13]. Vulnerability is the point of weakness or the state of being susceptible to an attack.…”
Section: Risk Threat Vulnerability and Outcomementioning
confidence: 99%
See 1 more Smart Citation
“…Risk can be defined as the possibility of something bad happening [12]. Threat can be defined as an action or event which occur naturally or intentionally and has the potential to harm information, property, people, and the environment [13]. Vulnerability is the point of weakness or the state of being susceptible to an attack.…”
Section: Risk Threat Vulnerability and Outcomementioning
confidence: 99%
“…It can be physical or psychological, such as a computing element (e.g., weak software program) or a behavioral trait (e.g., sharing sensitive files without encryption). This has the potential to make an enterprise, person, project, or equipment susceptible to an attack [13]. The result of an attack is the outcome.…”
Section: Risk Threat Vulnerability and Outcomementioning
confidence: 99%
“…This covers technical risks and attacks as well as all other risks which occur at interfaces (human, enterprises, supply chains, etc.). For risk mitigation, it is necessary to understand the possible threats of data-processing systems and assess them by considering the whole system as opposed to focusing only on risks for single components [35,36]. Hence, risk management should be discussed across the value chain and should be shared so that barriers to adoption will be reduced.…”
Section: Industry 40 and Cyberphysical Systems (Cps): Anmentioning
confidence: 99%
“…Within a computer system, a vulnerability is typically defined as a weakness that can be exploited by an attacker to perform unauthorized actions. In the context of this paper, vulnerability is referred to as a state or quality of being attacked or harmed because of a weakness in the system or user actions (e.g., weak software, unencrypted file sharing) [1]. Consequently, the actions performed by taking undue advantage of these vulnerabilities are referred to as attacks [2].…”
Section: Introductionmentioning
confidence: 99%