Javascript must be enabled to continue!
Application of the Reference Model for Security Risk Management in the Internet of Things Systems
View through CrossRef
Security in the Internet of Things (IoT) systems is an important topic. In the previous study we have presented a reference model for security risk management in the IoT systems. In this study we analyse how it can be applied. Specifically we consider an example of the connected vehicle and illustrate how the reference model could help discovering and explaining security vulnerabilities, defining security risks, and introducing security countermeasures.
Title: Application of the Reference Model for Security Risk Management in the Internet of Things Systems
Description:
Security in the Internet of Things (IoT) systems is an important topic.
In the previous study we have presented a reference model for security risk management in the IoT systems.
In this study we analyse how it can be applied.
Specifically we consider an example of the connected vehicle and illustrate how the reference model could help discovering and explaining security vulnerabilities, defining security risks, and introducing security countermeasures.
Related Results
The Geography of Cyberspace
The Geography of Cyberspace
The Virtual and the Physical
The structure of virtual space is a product of the Internet’s geography and technology. Debates around the nature of the virtual — culture, s...
Key Technologies of IoT Service Security and Privacy Protection
Key Technologies of IoT Service Security and Privacy Protection
The Internet of Things in the industrial industry has attracted widespread attention from the government, academia, and industry due to its huge application prospects. The core ide...
An information security analysis method of Internet of things based on balanced double SVM
An information security analysis method of Internet of things based on balanced double SVM
With the continuous progress of social science and technology, the development of the Internet of things is growing. With the development of Internet of things, security problems e...
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
Internet addiction among school children in the Western Province of Sri Lanka: A cross sectional analytical study (Preprint)
BACKGROUND
The internet is widely used across the world and in Sri Lanka for many purposes. Though essential for everyday life there are many negative aspec...
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and a...
ThreatBased Security Risk Evaluation in the Cloud
ThreatBased Security Risk Evaluation in the Cloud
Research ProblemCyber attacks are targeting the cloud computing systems, where enterprises, governments, and individuals are outsourcing their storage and computational resources f...
(originally published in October 1997)
(originally published in October 1997)
This paper is included in the First Monday Special Issue #3: Internet banking, e-money, and Internet gift economies, published in December 2005. Special Issue editor Mark A. Fox as...
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Towards the Integration of Blockchain and IoT for Security Challenges in IoT
Internet of things (IoT) technology plays a vital role in the current technologies because IoT develops a network by integrating different kinds of objects and sensors to create th...

