Security Risk Assessment in Internet of Things Systems

11/08/2018
by   Jason R. C. Nurse, et al.
0

Information security risk assessment methods have served us well over the past two decades. They have provided a tool for organizations and governments to use in protecting themselves against pertinent risks. As the complexity, pervasiveness, and automation of technology systems increases and cyberspace matures, particularly with the Internet of Things (IoT), there is a strong argument that we will need new approaches to assess risk and build trust. The challenge with simply extending existing assessment methodologies to IoT systems is that we could be blind to new risks arising in such ecosystems. These risks could be related to the high degrees of connectivity present or the coupling of digital, cyber-physical, and social systems. This article makes the case for new methodologies to assess risk in this context that consider the dynamics and uniqueness of the IoT while maintaining the rigor of best practice in risk assessment.

READ FULL TEXT
research
06/28/2018

If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems

Security risk assessment methods have served us well over the last two d...
research
10/14/2021

Assessing Risks and Modeling Threats in the Internet of Things

Threat modeling and risk assessments are common ways to identify, estima...
research
07/05/2023

Security Risk Analysis Methodologies for Automotive Systems

Nowadays, systematic security risk analysis plays a vital role in the au...
research
10/10/2019

WiFiCue: Public Wireless Access Security Assessment Tool

Public wireless access points are commonly provided by governments, busi...
research
06/23/2022

NoSQL security: can my data-driven decision-making be affected from outside?

Nowadays, there are billions interconnected devices forming Cyber-Physic...
research
05/27/2019

A Framework for Measuring the Costs of Security at Runtime

In Industry 4.0, Cyber-Physical Systems (CPS) are formed by components, ...
research
04/02/2016

The AGI Containment Problem

There is considerable uncertainty about what properties, capabilities an...

Please sign up or login with your details

Forgot password? Click here to reset