000 04363nam a22005775i 4500
001 978-3-031-08480-5
003 DE-He213
005 20240423125017.0
007 cr nn 008mamaa
008 220905s2022 sz | s |||| 0|eng d
020 _a9783031084805
_9978-3-031-08480-5
024 7 _a10.1007/978-3-031-08480-5
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
100 1 _aKieras, Timothy.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aIoT Supply Chain Security Risk Analysis and Mitigation
_h[electronic resource] :
_bModeling, Computations, and Software Tools /
_cby Timothy Kieras, Junaid Farooq, Quanyan Zhu.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXVI, 129 p. 65 illus., 58 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSpringerBriefs in Computer Science,
_x2191-5776
505 0 _aChapter. 1. IoT and Supply Chain Security -- Chapter. 2. Risk Modeling and Analysis -- Chapter. 3. Risk Mitigation Decisions -- Chapter. 4. Policy Management -- Chapter. 5. Computational Tools.
520 _aThis SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigatedthrough vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.
650 0 _aData protection.
650 0 _aCooperating objects (Computer systems).
650 0 _aFinancial risk management.
650 1 4 _aData and Information Security.
650 2 4 _aCyber-Physical Systems.
650 2 4 _aRisk Management.
700 1 _aFarooq, Junaid.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aZhu, Quanyan.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031084799
776 0 8 _iPrinted edition:
_z9783031084812
830 0 _aSpringerBriefs in Computer Science,
_x2191-5776
856 4 0 _uhttps://doi.org/10.1007/978-3-031-08480-5
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c173220
_d173220