Cyber security risk assessment for seaports: A case study of a container port

2021 ◽  
Vol 103 ◽  
pp. 102196
Author(s):  
Bunyamin Gunes ◽  
Gizem Kayisoglu ◽  
Pelin Bolat
Author(s):  
Gencer Erdogan ◽  
Phu H. Nguyen ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
...  

Risk-driven testing and test-driven risk assessment are two strongly related approaches, though the latter is less explored. This chapter presents an evaluation of a test-driven security risk assessment approach to assess how useful testing is for validating and correcting security risk models. Based on the guidelines for case study research, two industrial case studies were analyzed: a multilingual financial web application and a mobile financial application. In both case studies, the testing yielded new information, which was not found in the risk assessment phase. In the first case study, new vulnerabilities were found that resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.


2018 ◽  
pp. 192-211
Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


Author(s):  
Alexandros Flamos ◽  
Christos V. Roupas ◽  
John Psarras

Throughout the last two decades many attempts took place in order policy makers and researchers to be able to measure the energy security of supply of a particular country, region and corridor. This chapter is providing an overview presentation of the Energy Security Risk Assessment System (E.S.R.A.S.) which comprises the Module of Robust Decision Making (RDM) and the Module of Energy Security Indices Calculation (ESIC). Module 1 & 2 are briefly presented throughout section 2 and the application of Module 2 in nine case study countries is discussed at section 3. Finally, in the last section are the conclusions, which summarize the main points, arisen in this chapter.


Sign in / Sign up

Export Citation Format

Share Document