| Literature DB >> 35506054 |
Petar Radanliev1, David De Roure1, Pete Burnap2, Omar Santos3.
Abstract
The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems-which begin to resemble artificial intelligence-and can be used for a quantitative self-assessment of IoT cyber risk posture.Entities:
Keywords: Cyber risk regulations; Cyber risk self-assessment; Cyber risk target state; Empirical analysis; Epistemological analysis; Internet of Things; Risk transformation roadmap
Year: 2021 PMID: 35506054 PMCID: PMC8297719 DOI: 10.1007/s12626-021-00086-5
Source DB: PubMed Journal: Rev Socionetwork Strateg ISSN: 1867-3236
Epistemological equation—knowledge/justification of cyber risks
| Knowledge | ||||
| Understanding | 60 | ↕ | 60 | Understanding |
| Information | 50 | 50 | Information | |
| Quantitative | 40 | 40 | Qualitative | |
| Units of measurement | 30 | 30 | Symbols | |
| Quantitative units | 20 | 20 | Evidentialism | |
| Mathematical model | 10 | 10 | Reliabilism | |
| Justification | ||||
Epistemological equation—truth/belief of cyber risks
| 0.1 | 0.2 | 0.3 | Knowledge justification | 0.4 | 0.5 | 0.6 |
| Statistical methods | Probabilistic data | Numerical values | Idea | Expert opinion | Conventional system | |
| Truth | ↔ | Belief | ||||
Digital strategies assessed and categorised with the epistemological equation on ‘Knowledge’ and ‘Justification’ and ‘Truth’ and ‘Belief’
| Digital strategies | Cyber risk assessments | ||
|---|---|---|---|
| ‘Knowledge’ and ‘Justification’ | ‘Truth’ and ‘Belief’ | ||
| Germany | Industrie 4.0 | 10 | 0.1 |
| USA | Industrial Internet Consortium | 30 | 0.2 |
| Advanced Manufacturing Partnership | 40 | 0.4 | |
| UK | Digital Catapults | 10 | 0.1 |
| UK Digital Strategy | 20 | 0.6 | |
| Japan | Industrial Value Chain Initiative | 20 | 0.6 |
| New Robot Strategy and RRI | 10 | 0.1 | |
| France | New France Industrial—NFI | 20 | 0.4 |
| Nederland | Factories of the Future 4.0 | 10 | 0.1 |
| Belgium | Made Different | 20 | 0.5 |
| Spain | Industrie Conectada 4.0 | 50 | 0.4 |
| Italy | Fabbrica Intelligente | 40 | 0.6 |
| China | Made in China 2025 | 10 | 0.1 |
| G20 | Industrial Revolution | 60 | 0.4 |
| Russia | National Technology Initiative—NTI | 30 | 0.6 |
Fig. 1Four-quadrant graph displaying the R-squared values of risk assessment approaches in digital strategies—analysed with the ‘Knowledge’ and ‘Justification’ and ‘Truth’ and ‘Belief’ epistemological equation
Cyber risk assessment approaches assessed and categorised with the epistemological equation on ‘Knowledge’ and ‘Justification’ and ‘Truth’ and ‘Belief’
| Cyber risk method | Knowledge–justification | Truth–belief |
|---|---|---|
| FAIR | 20 | 0.4 |
| CMMI | 30 | 0.5 |
| CVSS | 20 | 0.6 |
| ISO | 40 | 0.4 |
| NIST | 60 | 0.5 |
| OCTAVE | 50 | 0.4 |
| TARA | 10 | 0.4 |
| RiskLens | 10 | 0.3 |
| CyVaR | 10 | 0.1 |
Fig. 2Four-quadrant graph displaying the R-squared values of cyber risk assessment methods—analysed with the ‘Knowledge’ and ‘Justification’ and ‘Truth’ and ‘Belief’ epistemological equation
Target state for IoT cyber risk assessment based on the epistemological equation
| Target state | ||||
|---|---|---|---|---|
| Vectors | Vector 1 | Vector 2 | Vector 3 | Vector 4 |
| Risk identification | Risk management | Risk estimation | Risk prioritisation | |
| Measure | Standardise | Compute | Strategy | |
| Risk models | ||||
| OCTAVE | Asset-based threat profiles | N/A | Qualitative | N/A |
| TARA | Cyber threat susceptibility assessment (CTSA) | Cyber risk remediation analysis (CRRA) | (a) Template threats (b) Scoring system (c) Threat matrix | Mission assurance engineering strategies (MAE) |
| CVSS | Base metrics | Mathematical approximation | Qualitative | N/A |
| Exostar | Managed access gateway (MAG) | Partner information management (PIM) and vendor quality management (VQM) | N/A | Source-to-pay software-as-a-service solution |
| CMMI and CMM | Maturity models | ISO 15504—SPICE | Maturity levels | N/A |
| NIST | Categorising | Assembling | Compliance | Compliance |
| FAIR | Financial | Compliance | Quantitative | Level of exposure |
| RiskLens | Probabilistic data | N/A | Monte Carlo simulations | N/A |
| CyVaR | Probabilistic data | Value at risk model | Monte Carlo simulations | N/A |
| ISO | ISO 27032 | ISO 27001 | Compliance | ISO 27031 |
| IoTMM | Probabilistic data | Value at risk model | Monte Carlo simulations | Micro Mort model |
|
| ||||
Transformation roadmap for reaching the target state for justification of truth in IoT cyber risk assessment—reaching the target state for IoT cyber risk assessment through the implementation tiers
| Transformational roadmap for IoT risk assessment |
|---|
| Implementation tiers—strengths for justification of truth: |
| OCTAVE has developed a standardised questionnaire that can be applied to investigate and categorise IoT risk impact areas |
| TARA is a predictive framework that enables targeting of the most crucial IoT exposures, as opposed to promoting the defence of all possible vulnerabilities |
| CVSS can be used to translate qualitative input into a numerical score reflecting severity and characteristics of IoT vulnerabilities |
| Exostar system can be used to assess, measure, and mitigate IoT risk in real-time across multi-tier partner and supplier networks and to determine the gaps between cybersecurity posture and regulatory compliance |
| CMMI can be used to simultaneously assess the full IoT product development life cycle risk and to measure multiple as opposed to stand-alone improvements |
| The NIST framework can be used in assessing IoT cyber risk, but more valuable in managing IoT cyber risks |
| FAIR model promotes a quantitative, risk based, acceptable level of loss exposure that can be adopted for IoT risk |
| ISO can be used to promote standardisation of IoT cyber risk and to reflect on international experience and knowledge |
| RiskLense presents a quantitative assessment with Monte Carlo simulations and can be adopted for IoT risk |
| CyVaR presents a method to quantitatively assess risk with Monte Carlo simulations and can be adopted for IoT risk |
|
|
Implementation tiers—weaknesses in current approaches for cyber risk assessment
| Implementation tiers—weaknesses for justification of truth |
|---|
| OCTAVE fails to provide a quantification method for calculating cyber risks—including IoT risk |
| TARA fails to quantify the impact of cyber risks—including IoT risk |
| CVSS contains scoring range between 0.0 and 10.0, but is based on a 3-level system and because the score is derived from a limited number of variables, it creates dissimilar vulnerabilities receiving similar score |
| Exostar system does not assess enterprises own cyber risk exposure. Instead, it helps enterprises to manage risk by understanding the strengths and vulnerabilities of their supply chain partners |
| CMMI does not explain how to implement improvements, but only indicates where improvements are needed. The improvements are not methodological processes and the actual processes an enterprise chooses depend on multiple factors. The CMMI simply does not map the IoT risk assessment processes |
| NIST framework is documented, not an automated tool and does not contain an impact assessment model for quantifying IoT cyber risk |
| FAIR framework promotes standardisation of quantitative models, but is difficult to use for IoT risk assessment, because it is not as documented as other frameworks |
| ISO is based on voluntary shared knowledge and is consensus based. International standardisation of IoT risk assessment requires a level of compulsory compliance |
| RiskLense contains a lack of details on the algorithm supporting its risk assessment. Process for IoT risk assessment is not included |
| CyVaR has the potential issue of a lack of the required IoT risk data to perform adequate and comprehensive assessments |
|
|
Implementation tiers—opportunities in current approaches for cyber risk assessment
| Implementation tiers—opportunities for justification of truth |
|---|
| OCTAVE is free and can be used as the foundation risk-assessment component or process for IoT risk assessment |
| TARA can be implemented as a complementary method IoT risk assessment, in combination with OCTAVE |
| CVSS currently has a 3-level scoring system, and as such the biggest opportunity is to integrate IoT risk in the form of more levels in the calculator to represent cyber risk with greater precision |
| Exostar system could evolve into a system that assesses enterprises own IoT cyber risk exposure, while enabling the assessment of cyber risk from supply chain partners |
| CMMI is related to ISO 9001. The ISO 9001 specifies a minimal acceptable quality level, while CMMI specifies continuous process improvement. Biggest opportunity is to adapt CMMI with continuous updates from ISO 9001 and with emerging IoT standards |
| The NIST is based on an extensive use of acronyms, which can be confusing and require a detailed understanding of the standards referred to in the acronyms. Hence, the greatest opportunity would be adding IoT risk acronyms in the process of simplifying the design. This could be done by replacing the acronyms with a new user-friendly tool to incorporate a fully automated guidance process (e.g., such as CVSS calculator) |
| FAIR is complementary to existing risk frameworks and applies knowledge from existing quantitative models. This represents an opportunity for developing a standardisation IoT risk reference architecture |
| ISO could evolve into an international standardisation of IoT cyber risk/security framework |
| RiskLense could evolve into the first standardised quantitative model for IoT cyber risk assessment. More academic research is required on this model to define and disclose the algorithm. This would increase the acceptance of this model, as academic research would enable the model to be verified and validated |
| CyVaR needs to be adapted and modified to include units of measurement for IoT cyber risk vectors |
|
|
Implementation tiers—threats for justification of truth in current approaches for cyber risk assessment
| Implementation tiers—threats for justification of truth |
|---|
| OCTAVE method is complex and takes time to understand. This is the main weakness as it is a qualitative method that does not provide mathematical or financial modelling |
| TARA focuses on reducing cost by covering only the exposures that are most likely to occur, but the assessment ignores IoT risks |
| CVSS converting qualitative data into a quantitative result, with relatively low-level mathematical approximation, could create a false level of security |
| Exostar system uses third-party sources to provide insights in the cyber health and viability of supply chain partners. The validity of the data depends on the third-party sources and if this cyber data is incomplete or compromised, the insights would also be compromised |
| CMMI measures are easy to recognise but difficult to develop. For instance, CMMI does not provide guidance on how to implement improvements, it simply indicates where improvements are required |
| NIST as a documented model, depends on many documents being continuously updated. Unless it evolves into a more automated process, the framework would need constantly to be reviewed and updated as new technology and laws emerge |
| FAIR depends on a computational engine for calculating risk and a model for analysing complex risk scenarios RiskLens [ |
| ISO contains members from 161 countries and 778 technical committees and subcommittees. This presents a major challenge in coordination and integration of specific standards [ |
| RiskLense, without the academic peer-review rigour and industry expert review, represents a model that is very difficult to verify and validate. Without such validation, the results would be questionable |
| CyVaR is a fairly complicated approach and unless simplified, in a software format, similar to the CVSS, it could be difficult to implement as a standard model for cyber impact risk assessment |
|
|
Fig. 3Web of Science analyse results data mining tool—discussion on article results with bibliometric analysis
Fig. 4Three-fields plot: bibliometric analysis with R Studio on epistemology and information technology data records
Fig. 5Topic dendrogram: factorial analysis with R Studio on epistemology and information technology data records
Fig. 6VOSviewer bibliometric analysis of data records on epistemology, complex systems and computer science