2019
DOI: 10.1016/j.promfg.2020.01.077
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment for Cyber Security of Manufacturing Systems: A Game Theory Approach

Abstract: This paper presents a novel approach using game theory to assess the risk likelihood in manufacturing systems quantifiably. Cybersecurity is a pressing issue in the manufacturing sector. Nevertheless, managing the risk in cybersecurity has become a critical challenge for modern manufacturing enterprises. In risk management thinking, the first step is to identify the risk, then validate it, and lastly, consider responses to the risk. If the risk is below the security risk appetite of the manufacturing system, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
8
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 21 publications
(7 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…The management of this risk should give a general view of the organization through the cataloguing of resources, the identification of threats and the valuing of vulnerabilities [9]. In a Cyber scenario, Risk Management should be done on very different and complex systems with the aim of identifying the risk, then validate it and, lastly, consider responses to the risk [10].…”
Section: Risk Managementmentioning
confidence: 99%
“…The management of this risk should give a general view of the organization through the cataloguing of resources, the identification of threats and the valuing of vulnerabilities [9]. In a Cyber scenario, Risk Management should be done on very different and complex systems with the aim of identifying the risk, then validate it and, lastly, consider responses to the risk [10].…”
Section: Risk Managementmentioning
confidence: 99%
“…However, at the global level, the diversity of norms and criteria established for aspects associated with business schemes, risk policies, risk analysis and their management, make it difficult to assume one as the best, as they differ in their approaches, but above all, due to the lack of a methodological process approach to assume these activities and the difficulty of having software based technological alternatives to assist in this work. In this scenario, research in security risk management has been proposing several approaches: quantitative, qualitative and hybrid, as well as approaches related to implementation of management and analysis tools, often using fuzzy logic algorithms [3][4], computational intelligence [5], game theory [6], among others.…”
Section: Problem Contextualizationmentioning
confidence: 99%
“…Linear programming has been utilized in cyber-attack prevention, yet the capability to devise practical mathematical solutions to gaming problems remains a significant challenge within game theory (Amadi et al, 2017). Additionally, Zarreh et al (2019) tackled cybersecurity challenges in sophisticated manufacturing systems characterized by high-level computer-controlled integration. Their research proposed a method for constructing and addressing a game theory model, albeit with the simplification of employing zero-sum game theory, which may not reflect reality accurately.…”
Section: Introductionmentioning
confidence: 99%