Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Cyber Security Threat Modeling for Supply Chain Organizational Environments
by
Islam, Shareeful
, Yeboah-Ofori, Abel
in
Algorithms
/ attack modeling
/ Communication
/ cyber security
/ cyber supply chain
/ Cybersecurity
/ Electricity distribution
/ Energy industry
/ Internet
/ Smart grid
/ Smart grid technology
/ Software
/ Suppliers
/ Supply chains
/ Third party
/ threat actor
/ Threat evaluation
/ threat intelligence
/ Threat models
/ Threats
/ Wireless networks
2019
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Cyber Security Threat Modeling for Supply Chain Organizational Environments
by
Islam, Shareeful
, Yeboah-Ofori, Abel
in
Algorithms
/ attack modeling
/ Communication
/ cyber security
/ cyber supply chain
/ Cybersecurity
/ Electricity distribution
/ Energy industry
/ Internet
/ Smart grid
/ Smart grid technology
/ Software
/ Suppliers
/ Supply chains
/ Third party
/ threat actor
/ Threat evaluation
/ threat intelligence
/ Threat models
/ Threats
/ Wireless networks
2019
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Cyber Security Threat Modeling for Supply Chain Organizational Environments
by
Islam, Shareeful
, Yeboah-Ofori, Abel
in
Algorithms
/ attack modeling
/ Communication
/ cyber security
/ cyber supply chain
/ Cybersecurity
/ Electricity distribution
/ Energy industry
/ Internet
/ Smart grid
/ Smart grid technology
/ Software
/ Suppliers
/ Supply chains
/ Third party
/ threat actor
/ Threat evaluation
/ threat intelligence
/ Threat models
/ Threats
/ Wireless networks
2019
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Cyber Security Threat Modeling for Supply Chain Organizational Environments
Journal Article
Cyber Security Threat Modeling for Supply Chain Organizational Environments
2019
Request Book From Autostore
and Choose the Collection Method
Overview
Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.
This website uses cookies to ensure you get the best experience on our website.