Definition of Internet of Things (IoT) Cyber Risk Discussion on a Transformation Roadmap for Standardisation of Regulations Risk Maturity Strategy Design and Impact Assessment

A comparative empirical analysis is performed to define a high-level potential target state followed by a high-level transformation roadmap, describing how company can achieve their target state, based on their current state. The transformation roadmap is used to adapt the Goal-Oriented Approach and the IoT Micro Mart model.

[1]  C. Fung,et al.  Value analysis of cyber security based on attack types , 2015 .

[2]  Michael Huth,et al.  Future Developments in Cyber Risk Assessment for the Internet of Things , 2018, Comput. Ind..

[3]  Petar Radanliev,et al.  Engineering Design Methodology for Green-Field Supply Chain Architectures Taxonomic Scheme , 2015 .

[4]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[5]  Paulo Leitão,et al.  Industrial automation based on cyber-physical systems technologies: Prototype implementations and challenges , 2016, Comput. Ind..

[6]  Anne Marsden,et al.  International Organization for Standardization , 2014 .

[7]  Pengcheng Zhang,et al.  A generalized modeling framework to analyze interdependencies among infrastructure systems , 2011 .

[8]  Joseph Lindley,et al.  Internet of Things: realising the potential of a trusted smart world , 2018 .

[9]  Alberto L. Sangiovanni-Vincentelli,et al.  Taming Dr. Frankenstein: Contract-Based Design for Cyber-Physical Systems , 2012, Eur. J. Control.

[10]  Petar Radanliev,et al.  Economic impact of IoT cyber risk - Analysing past and present to predict the future developments in IoT risk analysis and IoT cyber insurance , 2018, IoT 2018.

[11]  Peter Burnap,et al.  Methodology for Designing Decision Support Systems for Visualising and Mitigating Supply Chain Cyber Risk from IoT Technologies , 2019, ArXiv.

[12]  Kenneth M. Hanson,et al.  THE BAYES INFERENCE ENGINE , 1996 .

[13]  David De Roure,et al.  Integration of Cyber Security Frameworks‚ Models and Approaches for Building Design Principles for the Internet−of−Things in Industry 4.0 , 2018, IoT 2018.

[14]  Petar Radanliev,et al.  Supply Chain Paradox: Green-field Architecture for Sustainable Strategy Formulation , 2015 .

[15]  Sadie Creese,et al.  If you can't understand it, you can't properly assess it! The reality of assessing security risks in Internet of Things systems , 2018, IoT 2018.

[16]  Eirini Anthi,et al.  Definition of Internet of Things (IoT) Cyber Risk – Discussion on a Transformation Roadmap for Standardisation of Regulations, Risk Maturity, Strategy Design and Impact Assessment , 2019 .

[17]  Peter C. Evans,et al.  Industrial Internet: Pushing the Boundaries of Minds and Machines , 2012 .

[18]  Muhammad Bilal,et al.  A Review of Internet of Things Architecture, Technologies and Analysis Smartphone-based Attacks Against 3D printers , 2017, ArXiv.

[19]  Michael Huth,et al.  Mapping the values of IoT , 2018, J. Inf. Technol..

[20]  Sadie Creese,et al.  Sonification in security operations centres: what do security practitioners think? , 2018, ArXiv.

[21]  Lihui Wang,et al.  Current status and advancement of cyber-physical systems in manufacturing , 2015 .

[22]  Petar Radanliev,et al.  Green-Field Architecture for Sustainable Supply Chain Strategy Formulation , 2015 .

[23]  Josune Hernantes,et al.  Critical infrastructure dependencies: A holistic, dynamic and quantitative approach , 2015, Int. J. Crit. Infrastructure Prot..

[24]  Martin D. Weinberg,et al.  Computational statistics using the Bayesian Inference Engine , 2012, 1203.3816.

[25]  Petar Radanliev,et al.  Architectures for Green-Field Supply Chain Integration: Supply Chain Integration Design , 2015 .

[26]  Michael Huth,et al.  Cyber Risk impact Assessment - Assessing the Risk from the IoT to the Digital Economy , 2019 .

[27]  Petar Radanliev A conceptual framework for supply : supply chain systems architecture and integration design based on practice and theory in the North Wales slate mining industry , 2014 .

[28]  Michael Huth,et al.  A reference architecture for integrating the Industrial Internet of Things in the Industry 4.0 , 2019, ArXiv.

[29]  Larry Feldman,et al.  The Cybersecurity Framework: Implementation Guidance for Federal Agencies , 2017 .

[30]  Keyun Ruan,et al.  Introducing cybernomics: A unifying economic framework for measuring cyber risk , 2017, Comput. Secur..

[31]  Panayiotis Kotzanikolaou,et al.  Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures , 2016, Int. J. Crit. Infrastructure Prot..

[32]  Zachary A. Collier,et al.  Systems engineering framework for cyber physical security and resilience , 2015, Environment Systems and Decisions.

[33]  Petar Radanliev,et al.  Supply Chain Systems Architecture and Engineering Design: Green-Field Supply Chain Integration , 2015 .

[34]  G. Rodewald. Aligning information security investments with a firm's risk tolerance , 2005, InfoSecCD '05.

[35]  David Wright,et al.  Stochastic Modelling of the Effects of Interdependencies between Critical Infrastructure , 2009, CRITIS.

[36]  Sadie Creese,et al.  Security Risk Assessment in Internet of Things Systems , 2017, IT Professional.

[37]  Jason R. C. Nurse,et al.  Insider threat response and recovery strategies in financial services firms , 2016 .

[38]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.