2018
DOI: 10.1007/978-3-319-75880-0_2
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management for CPS Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…Several security risk assessment methods applicable to general purpose IT systems have appeared in the literature (see Reference [ 8 ] for a comprehensive survey). Even though several of these methods can be and have been applied to CPSs, they cannot accurately assess cyber risks related to CPSs according to Reference [ 9 ], where a number of approaches for risk assessment for CPSs are listed. A review of risk assessment methods for CPSs, from the perspective of safety, security, and their integration, including a proposal for some classification criteria was made in Reference [ 10 ].…”
Section: Related Workmentioning
confidence: 99%
“…Several security risk assessment methods applicable to general purpose IT systems have appeared in the literature (see Reference [ 8 ] for a comprehensive survey). Even though several of these methods can be and have been applied to CPSs, they cannot accurately assess cyber risks related to CPSs according to Reference [ 9 ], where a number of approaches for risk assessment for CPSs are listed. A review of risk assessment methods for CPSs, from the perspective of safety, security, and their integration, including a proposal for some classification criteria was made in Reference [ 10 ].…”
Section: Related Workmentioning
confidence: 99%
“…In other words, if the capabilities of ESs increase in terms of points of connection and input units, then attack surfaces increase, thereby increasing the probability that the system is hacked. [26] ES design principles [20] ESs' security from new dimension [27] Security-aware and real-time ES [28] Hardware enhancement of ES [29] Cybersecurity for cyber-physical system [22] IoT and security measurements [30] Taxonomy of detection approaches [31] Data privacy and policy problems survey [13] Security requirements and challenges in IoT [32] Challenges, threats and solutions of IoT [33] A roadmap for security challenges in the IoT [7] A taxonomy of threats, vulnerabilities and attacks. [34] A survey of cyber-physical systems security [35] Security framework for IoT…”
Section: A Security Problemsmentioning
confidence: 99%
“…This threat can be an intentional action, accidental event, or an abnormal circumstance. Cyber threats include unstructured threats, which use existing hacking tools, and structured threats, e.g., Advanced Persistent Threats (APTs), conducted by an expert attacker [25], [29], [46], [47]. APT is a prolonged and targeted cyberattack in which an intruder gains access to a network and tries to remain undetected.…”
Section: B Classic Attacks and Impact On Essmentioning
confidence: 99%
See 1 more Smart Citation
“…The growth of cloud computing and IoT have brought their own set of challenges in the form of increased attack surfaces and data security. Current cyber security solutions are not capable of stopping these threats in terms of their efficacy and scalability [17], [21]. In addition, there is a trend in increasing attack sophistication and speed of attack propagation as the internet has reached a global scale, making it possible to launch sophisticated attacks at little or no development costs in a few seconds to target entities across the globe [20].…”
Section: Anomaly Behavior Analysismentioning
confidence: 99%