Proceedings of the 2nd International Conference on Information Systems Security and Privacy 2016
DOI: 10.5220/0005796805090513
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the Impact of Cyber Security Risks on Safety

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The risk management process involves three major steps, that is, risk identification, risk assessment, and risk mitigation. 19 Risk identification can be done via misuse cases, by applying safety hazard analysis methods including fault tree analysis, 20 systematic theoretic process analysis, 21 hazard operative, 22 and failure mode effect analysis, 23 among others. In CPS, risks can be introduced through intrusions from hackers, malfunctioning, software issues, hardware, or network failure.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The risk management process involves three major steps, that is, risk identification, risk assessment, and risk mitigation. 19 Risk identification can be done via misuse cases, by applying safety hazard analysis methods including fault tree analysis, 20 systematic theoretic process analysis, 21 hazard operative, 22 and failure mode effect analysis, 23 among others. In CPS, risks can be introduced through intrusions from hackers, malfunctioning, software issues, hardware, or network failure.…”
Section: Related Workmentioning
confidence: 99%
“…The related work consists of three parts based on the literature: safety security risk management process, safety security requirements and related standards. The risk management process involves three major steps, that is, risk identification, risk assessment, and risk mitigation 19 . Risk identification can be done via misuse cases, by applying safety hazard analysis methods including fault tree analysis, 20 systematic theoretic process analysis, 21 hazard operative, 22 and failure mode effect analysis, 23 among others.…”
Section: Related Workmentioning
confidence: 99%