Assessing cyber threats for storyless systems

被引:12
|
作者
Meland, Per Hakon [1 ,3 ]
Nesheim, Dag Atle [2 ]
Bernsmed, Karin [1 ]
Sindre, Guttorm [3 ]
机构
[1] SINTEF Digital, Strindvegen 4, N-7465 Trondheim, Norway
[2] SINTEF Ocean, Postboks 4762 Torgard, N-7465 Trondheim, Norway
[3] Norwegian Univ Sci & Technol, Hogskoleringen 1, N-7491 Trondheim, Norway
基金
欧盟地平线“2020”;
关键词
Cyber threats; Decision-making; Estimation; Empirical evaluation; Case study; Maritime communication; RISK-MANAGEMENT; CYBERSECURITY; OPPORTUNITY; FRAMEWORK; CHOICE; MODEL;
D O I
10.1016/j.jisa.2021.103050
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proper assessment of potential cyber threats is vital for security decision-making. This becomes an even more challenging task when dealing with new system designs and industry sectors where there is little or no historical data about past security incidents. We have developed a threat likelihood estimation approach that supports risk management under such circumstances. Quantifiable conditions are determined from the environment in which the system will reside and operate, that is the availability of potential threat actors, their opportunities of performing attacks, the required means that are needed for the attack to succeed, and motivation factors. Our research method follows the principles of practice research where both researchers and practitioners have played central roles in a real-life development project for a maritime communication system. We used a qualitative case study for feature-based evaluation of the approach and associated tool template, and to gather evidence on practical aspects such as suitability for purpose, efficiency and drawbacks from five user groups. The results show that representative participants from the cyber security and maritime community gave positive and consistent scores on the features, and regarded time usage, traceability of the threat assessment and the ability to indicate underlying uncertainty to be very appropriate. The approach has been proven useful for this domain and should be applicable to others as well, but the template requires up-front investments in gathering knowledge that is relevant and reusable in additional context situations.
引用
下载
收藏
页数:15
相关论文
共 50 条
  • [21] Cyber threats to health information systems: A systematic review
    Luna, Raul
    Rhine, Emily
    Myhra, Matthew
    Sullivan, Ross
    Kruse, Clemens Scott
    TECHNOLOGY AND HEALTH CARE, 2016, 24 (01) : 1 - 9
  • [22] Cyber-Physical Systems: Security Threats and Countermeasures
    Hammoudeh, Mohammad
    Epiphaniou, Gregory
    Pinto, Pedro
    JOURNAL OF SENSOR AND ACTUATOR NETWORKS, 2023, 12 (01)
  • [23] Securing unmanned autonomous systems from cyber threats
    Madan, Bharat B.
    Banik, Manoj
    Bein, Doina
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2019, 16 (02): : 119 - 135
  • [24] A Computational Framework for Cyber Threats in Medical IoT Systems
    Rathee, Geetanjali
    Saini, Hemraj
    Kerrache, Chaker Abdelaziz
    Herrera-Tapia, Jorge
    ELECTRONICS, 2022, 11 (11)
  • [25] Cyber security threats in industrial control systems and protection
    Marali, Mounesh
    Sudarsan, Sithu D.
    Gogioneni, Ashok
    PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING & COMMUNICATION ENGINEERING (ICACCE-2019), 2019,
  • [26] Assessing Cyber-threats Situation for Electric Power Information Networks
    Wang, Yufei
    Wang, Jing
    Xu, Zhibo
    Li, Huan
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 1557 - 1562
  • [27] Physical threats vs Cyber threats
    Setola, Roberto
    International Journal of Critical Infrastructure Protection, 2024, 47
  • [28] A Bayesian Framework for the Analysis and Optimal Mitigation of Cyber Threats to Cyber-Physical Systems
    Zebrowski, Piotr
    Couce-Vieira, Aitor
    Mancuso, Alessandro
    RISK ANALYSIS, 2022, 42 (10) : 2275 - 2290
  • [29] Policing Cyber Hate, Cyber Threats and Cyber Terrorism
    Halder, Debarati
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2013, 7 (02): : 169 - 170
  • [30] Prepare for cyber threats
    Gill, Suzanne
    Control Engineering, 2019, 66 (10)