منابع مشابه
Cybersecurity Risk Assessment in Smart Grids
Smart grids will make extensive use of information and communication technology (ICT) to enable the integration of renewable energy sources. Consequently, future power grids come with a much larger cyber-attack surface, which makes cybersecurity risk assessment a major concern. Due to their cyber-physical nature, risk assessment in smart grids is a challenging task. Moreover, the complex mix of...
متن کاملDecision support for Cybersecurity risk planning
a r t i c l e i n f o Security countermeasures help ensure the confidentiality, availability, and integrity of information systems by preventing or mitigating asset losses from Cybersecurity attacks. Due to uncertainty, the financial impact of threats attacking assets is often difficult to measure quantitatively, and thus it is difficult to prescribe which countermeasures to employ. In this res...
متن کاملCybersecurity Cost of Quality: Managing the Costs of Cybersecurity Risk Management
There is no standard yet for measuring and controlling the costs associated with implementing cybersecurity programs. To advance research and practice towards this end, we develop a mapping using the well-known concept of quality costs and the Framework Core within the Cybersecurity Framework produced by the National Institute of Standards and Technology (NIST) in response to the Cybersecurity ...
متن کاملIntroducing OSSF: A framework for online service cybersecurity risk management
This paper proposes a new framework for online services security risk management which can be used by both service providers and service consumers.The proposed framework was validated through a case study performed in a large enterprise environment. The key components of the proposed framework are Threat model and Risk model. These models are designed to fit specific features of online services...
متن کاملLinking Cybersecurity Knowledge: Cybersecurity Information Discovery Mechanism
To cope with increasing amount of cyber threats, organizations need to share cybersecurity information beyond the borders of organizations, countries, and even languages. Assorted organizations built repositories that store and provide XML-based cybersecurity information on the Internet. Among them are NVD [1], OSVDB [2], and JVN [3], and more cybersecurity information from various organization...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Departmental Papers / Policy Papers
سال: 2019
ISSN: 2616-5333
DOI: 10.5089/9781513507545.087