Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape

Abel Yeboah-Ofori, Daniel Opoku-Akyea
{"title":"Mitigating Cyber Supply Chain Risks in Cyber Physical Systems Organizational Landscape","authors":"Abel Yeboah-Ofori, Daniel Opoku-Akyea","doi":"10.1109/ICSIoT47925.2019.00020","DOIUrl":null,"url":null,"abstract":"Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.","PeriodicalId":226799,"journal":{"name":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Cyber Security and Internet of Things (ICSIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSIoT47925.2019.00020","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Cyber supply chain (CSC) provide an organizationwith the ability to align its business processes, informationflows and data structures with other organization. However, the increase interdependencies have brought about inherent, threats, risks, attacks and vulnerabilities that adversaries maybe able to exploit when not properly mitigated. Additionally, every cyberattack on each organization increases theprobability of the risk cascading to others. The CSC risk hasincreased exponentially due to uncertainties surroundingcyberattacks and the cyber threat landscape. Recent CSCthreats have been disruptive and impacting on the smooth flowof delivery of products and services. CSC risk has beenobserved as one of the areas that impact greatly and causesbudget overruns. The aim of this paper is to mitigate CSCrisks in an organizational landscape. In particular, the paperidentifies supply inbound and outbound chain threatlandscape using a risk breakdown structure. Further, weassess the risk to gather cyber threat intelligence. Furthermore, we use the probability distribution method todetermine the CSC risks and analyze the risk probabilities andlikelihood of risk cascading impact. Our results show thatCSC risk can be neutralized using probability distributionmethods to detect and mitigate the risks and their impactlevels.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
降低网络物理系统组织结构中的网络供应链风险
网络供应链(CSC)为组织提供了使其业务流程、信息流和数据结构与其他组织保持一致的能力。然而,相互依赖性的增加带来了固有的威胁、风险、攻击和漏洞,如果不适当减轻,对手可能会利用这些威胁、风险、攻击和漏洞。此外,针对每个组织的每一次网络攻击都增加了风险层叠到其他组织的可能性。由于网络攻击和网络威胁环境的不确定性,CSC风险呈指数级增长。最近的csc威胁具有破坏性,影响了产品和服务的顺利交付。CSC风险被认为是影响巨大并导致预算超支的领域之一。本文的目的是减轻组织环境中的cscs风险。特别是,本文使用风险分解结构确定了供应入库和出库链的威胁情况。此外,我们评估收集网络威胁情报的风险。在此基础上,运用概率分布法确定了CSC风险,分析了风险概率和风险级联影响的可能性。我们的研究结果表明,csc风险可以使用概率分布方法来检测和减轻风险及其影响水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Detecting Cyber Supply Chain Attacks on Cyber Physical Systems Using Bayesian Belief Network [Title page iii] Using RC4 and Whirlpool for the Encryption and Validation of Data in IoT A Cryptographic Technique for Authentication and Validation of Forensic Account Audit Using SHA256 Node to Node Secure Data Communication for IoT Devices Using Diffie-Hellman, AES, and MD5 Cryptographic Schemes
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1