Vis enkel innførsel

dc.contributor.authorPandey, Pankaj
dc.contributor.authorCollen, Anastasija
dc.contributor.authorNijdam, Niels Alexander
dc.contributor.authorAnagnostopoulos, Marios
dc.contributor.authorKatsikas, Sokratis
dc.contributor.authorKonstantas, Dimitri
dc.date.accessioned2020-01-29T09:55:20Z
dc.date.available2020-01-29T09:55:20Z
dc.date.created2019-10-30T13:25:22Z
dc.date.issued2019
dc.identifier.citationProceedings of the ... European conference on information warfare and security. 2019, 2019-July 839-844.nb_NO
dc.identifier.issn2048-8602
dc.identifier.urihttp://hdl.handle.net/11250/2638515
dc.description.abstractCyber security is a concern of each citizen, especially when it comes to novel technologies surrounding us in our daily lives. Fighting a cyber battle while enjoying your cup of coffee and observing gentle lights dimming when you move from the kitchen to the sitting room to review your today’s running training, is no longer science fiction. A multitude of the cyber security solutions are currently under development to satisfy the increasing demand on threats and vulnerabilities identification and private data leakage detection tools. Within this domain, ubiquitous decision making to facilitate the life of the regular end-users is a key feature here. In this paper we present a Risk Assessment Model (RAM), originating from Negative to Positive approach, to automate the threat-based Risk Assessment (RA) process, tailored specifically to the smart home environments. The calculation model application is demonstrated on derived threat-triggered evaluation scenarios, which were established from analysing the historical evidence of data communication within the smarthome context. The main features of the proposed RAM are identification of the existing risks, estimation of the consequences on possible positive and negative actions and embedding of the mitigation strategies. The application of this modelling approach for automation of RA would lead to a deep understanding on the extent to which decision making could be automated while tracking and controlling the cyber risks within the end-user’s accepted risk level. Through the proposed RAM, common factors and variables are extracted and integrated into a quantified risk model before being embedded in the automated decision making process. This research falls within the GHOST (Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control) project, aiming to provide a cyber security solution targeted at the regular citizens.nb_NO
dc.language.isoengnb_NO
dc.publisherAcademic Publishingnb_NO
dc.titleTowards automated threat-based risk assessment for cyber security in smarthomesnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber839-844nb_NO
dc.source.volume2019-Julynb_NO
dc.source.journalProceedings of the ... European conference on information warfare and securitynb_NO
dc.identifier.cristin1742254
dc.description.localcodeThis article will not be available due to copyright restrictions (c) 2019 by Academic Publishingnb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel