Vis enkel innførsel

dc.contributor.authorKavallieratos, Georgios
dc.contributor.authorSpathoulas, Georgios
dc.contributor.authorKatsikas, Sokratis
dc.date.accessioned2022-11-24T10:09:23Z
dc.date.available2022-11-24T10:09:23Z
dc.date.created2021-03-05T09:09:45Z
dc.date.issued2021
dc.identifier.citationSensors. 2021, 21 (5), .en_US
dc.identifier.issn1424-8220
dc.identifier.urihttps://hdl.handle.net/11250/3033832
dc.description.abstractThe increasingly witnessed integration of information technology with operational technology leads to the formation of Cyber-Physical Systems (CPSs) that intertwine physical and cyber components and connect to each other to form systems-of-systems. This interconnection enables the offering of functionality beyond the combined offering of each individual component, but at the same time increases the cyber risk of the overall system, as such risk propagates between and aggregates at component systems. The complexity of the resulting systems-of-systems in many cases leads to difficulty in analyzing cyber risk. Additionally, the selection of cybersecurity controls that will effectively and efficiently treat the cyber risk is commonly performed manually, or at best with limited automated decision support. In this work, we propose a method for analyzing risk propagation and aggregation in complex CPSs utilizing the results of risk assessments of their individual constituents. Additionally, we propose a method employing evolutionary programming for automating the selection of an optimal set of cybersecurity controls out of a list of available controls, that will minimize the residual risk and the cost associated with the implementation of these measures. We illustrate the workings of the proposed methods by applying them to the navigational systems of two variants of the Cyber-Enabled Ship (C-ES), namely the autonomous ship and the remotely controlled ship. The results are sets of cybersecurity controls applied to those components of the overall system that have been identified in previous studies as the most vulnerable ones; such controls minimize the residual risk, while also minimizing the cost of implementation.en_US
dc.language.isoengen_US
dc.publisherMDPIen_US
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleCyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systemsen_US
dc.title.alternativeCyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systemsen_US
dc.typePeer revieweden_US
dc.typeJournal articleen_US
dc.description.versionpublishedVersionen_US
dc.source.pagenumber21en_US
dc.source.volume21en_US
dc.source.journalSensorsen_US
dc.source.issue5en_US
dc.identifier.doi10.3390/s21051691
dc.identifier.cristin1895801
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal