| Literature DB >> 33251087 |
Petar Radanliev1, David De Roure1, Max Van Kleek1, Uchenna Ani2, Pete Burnap3, Eirini Anthi3, Jason R C Nurse4, Omar Santos5, Rafael Mantilla Montalvo5, La'Treall Maddox5.
Abstract
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture. By security posture this article refers to the cybersecurity strength of an organisation to predict, prevent and respond to cyberthreats. At present, there is a gap in the state of the art, because there are no self-assessment methods for quantifying IoT cyber risk posture. To address this gap, an empirical analysis is performed of 12 cyber risk assessment approaches. The results and the main findings from the analysis is presented as the current and a target risk state for IoT systems, followed by conclusions and recommendations on a transformation roadmap, describing how IoT systems can achieve the target state with a new goal-oriented dependency model. By target state, we refer to the cyber security target that matches the generic security requirements of an organisation. The research paper studies and adapts four alternatives for IoT risk assessment and identifies the goal-oriented dependency modelling as a dominant approach among the risk assessment models studied. The new goal-oriented dependency model in this article enables the assessment of uncontrollable risk states in complex IoT systems and can be used for a quantitative self-assessment of IoT cyber risk posture.Entities:
Keywords: Cyber risk regulations; Cyber risk self-assessment; Cyber risk target state; Empirical analysis; Functional dependency; Goal-oriented approach; Internet of things; Micro-mort model; Network-based linear dependency modelling; Transformation roadmap
Year: 2020 PMID: 33251087 PMCID: PMC7680653 DOI: 10.1007/s10669-020-09792-x
Source DB: PubMed Journal: Environ Syst Decis ISSN: 2194-5411
Fig. 1Three-Field Plot of sub-topics and keywords in research on IoT cyber risk
Fig. 2Global collaboration network on IoT cyber risk research
Fig. 3Factorial analysis of research on IoT cyber risk
Transformation implementation tiers categorised with a Goal-Oriented approach—describing how the transformational roadmap can be applied in a case-specific scenario
| Control goal ( |
| Control objective ( |
| Control element ( |
| Control goal ( |
| Control objective ( |
| Control element ( |
| Control goal ( |
| Control objective ( |
| Control element ( |
| Control goal ( |
| Control objective ( |
| Control element ( |
| Notes: links with: (a) network security; (b) identity and access management |
| Control goal ( |
| Control objective ( |
| Control element ( |
| Control goal ( |
| Control objective ( |
| Control element ( |
| Control goal ( |
| Control objective ( |
| Control element ( |
Fig. 4Transformation implementation tiers categorised in Microsoft Excel to reflex the level of the ‘justification of truth’—simple understanding vs evidentialism
Fig. 5Network-based (Component/Layer) Linear Interdependency Structure