scholarly journals Application of Bayesian network to data-driven cyber-security risk assessment in SCADA networks

Author(s):  
Kaixing Huang ◽  
Chunjie Zhou ◽  
Yu-Chu Tian ◽  
Weixun Tu ◽  
Yuan Peng
2018 ◽  
pp. 192-211
Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


Author(s):  
Kristian Herland ◽  
Heikki Hämmäinen ◽  
Pekka Kekolahti

This study comprises an information security risk assessment of smartphone use in Finland using Bayesian networks. The primary research method is a knowledge-based approach to build a causal Bayesian network model of information security risks and consequences. The risks, consequences, probabilities and impacts are identified from domain experts in a 2-stage interview process with 8 experts as well as from existing research and statistics. This information is then used to construct a Bayesian network model which lends itself to different use cases such as sensitivity and scenario analysis. The identified risks’probabilities follow a long tail wherein the most probable risks include unintentional data disclosure, failures of device or network, shoulder surfing or eavesdropping and loss or theft of device. Experts believe that almost 50% of users share more information to other parties through their smartphones than they acknowledge or would be willing to share. This study contains several implications for consumers as well as indicates a clear need for increasing security awareness among smartphone users.  


Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


Sign in / Sign up

Export Citation Format

Share Document