An Information Security Risk Management Model for Smart Industries

被引:1
|
作者
Sohrabi Safa, Nader [1 ]
Maple, Carsten [1 ]
Watson, Tim [1 ]
机构
[1] Univ Warwick, Cyber Secur Ctr WMG, Coventry, W Midlands, England
关键词
CYBER SECURITY; CULTURE; PROTECTION; FRAMEWORK; BEHAVIOR;
D O I
10.3233/978-1-61499-792-4-257
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Internet of Things (IoT) has been acknowledged as a new revolution in technology. IoT play an important role in the flourishing of smart manufacturing and in supply chains. However, information security is a controversial issue in this domain. In this paper, a novel information security management model is presented that shows how an appropriate threat model and risk model can mitigate the risk of information security breaches in an industrial environment. Risk identification based on organisational assets, analysis, evaluation, and treatment along with scope specification considering risk management in ISO/IEC 27005, HTRA, CORAS and OCTAVE Allegro have been considered in the framework development. The presented model mitigates the risk of information security for both service providers and service consumers in this environment. At the end of the paper, we highlight the ways in which the current research supplies us with a direction for future research in this domain.
引用
收藏
页码:257 / 262
页数:6
相关论文
共 50 条
  • [1] Information security risk assessment model for risk management
    Wawrzyniak, Dariusz
    [J]. TRUST, PRIVACY, AND SECURITY IN DIGITAL BUSINESS, PROCEEDINGS, 2006, 4083 : 21 - 30
  • [2] Research on Information Security Strategy and Risk Management for Smart Grid
    Wang, Rui
    [J]. 2014 CHINA INTERNATIONAL CONFERENCE ON ELECTRICITY DISTRIBUTION (CICED), 2014,
  • [3] Construction of Information Security Risk Assessment Model in Smart City
    Hui, Pan
    [J]. 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 393 - 396
  • [4] A situation awareness model for information security risk management
    Webb, Jeb
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    [J]. COMPUTERS & SECURITY, 2014, 44 : 1 - 15
  • [5] Information Security Risk Management Model for Big Data
    Yang, Min
    [J]. ADVANCES IN MULTIMEDIA, 2022, 2022
  • [6] Fuzzy OWA Model for Information Security Risk Management
    Imamverdiev, Ya. N.
    Derakshande, S. A.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2011, 45 (01) : 20 - 28
  • [7] Assets Dependencies Model in Information Security Risk Management
    Breier, Jakub
    Schindler, Frank
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 405 - 412
  • [8] A Quantitative Model for Information-Security Risk Management
    Bojanc, Rok
    Jerman-Blazic, Borka
    [J]. ENGINEERING MANAGEMENT JOURNAL, 2013, 25 (02) : 25 - 37
  • [9] The Information Security Risk Management
    Semin, Valeriy G.
    Shmakova, Elena G.
    Los, Lexei B.
    [J]. PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE QUALITY MANAGEMENT,TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&QM&IS), 2017, : 106 - 109
  • [10] Information security and risk management
    Bodin, Lawrence D.
    Gordon, Lawrence A.
    Loeb, Martin P.
    [J]. COMMUNICATIONS OF THE ACM, 2008, 51 (04) : 64 - 68