scholarly journals Risk Level Calculation for IoT System

Author(s):  
Neelam Naik

Due to the complexity and heterogeneity of technology, devices, data and computation, Internet of Things (IoT) systems are vulnerable to the cyber-attacks. Many cyber security risk assessment frameworks dedicated to IoT systems are under study. This study introduces the unique risk ranking method by calculating risk impact and risk likelihood by quantifying them. This unique computational approach is applied in the context of medial domain to calculate risk ranking of two medical devices used in medical IoT-based system.

2018 ◽  
pp. 192-211
Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


Author(s):  
Harold Patrick ◽  
Ziska Fields

Information technology is rapidly increasing and evolving all the time in pursuit for better solutions and products for the digitized world. Technology advancement and greater connectivity has moved organizations to better economic markets for sustainability. Together with better technology and greater connectivity, cybercrime is swiftly growing on par with these developments. This chapter focuses on the cyber security landscape and threats faced by organizations. The growth and sophistication of cybercrime is stressed. Cyber security creative approaches security risk assessment, cloud collaboration and data analytics are provided. This chapter ends with propositions that security creative approaches should be used as a method of managing cybercrime and ensuring that the organization's sustainability and governance are improved.


Sign in / Sign up

Export Citation Format

Share Document