語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
IoT Supply Chain Security Risk Analysis and Mitigation/ by Timothy Kieras, Junaid Farooq, Quanyan Zhu.
其他題名:
Modeling, Computations, and Software Tools /
作者:
Kieras, Timothy.
其他作者:
Zhu, Quanyan.
面頁冊數:
XVI, 129 p. 65 illus., 58 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Risk Management. -
電子資源:
https://doi.org/10.1007/978-3-031-08480-5
ISBN:
9783031084805
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
Kieras, Timothy.
IoT Supply Chain Security Risk Analysis and Mitigation
Modeling, Computations, and Software Tools /[electronic resource] :by Timothy Kieras, Junaid Farooq, Quanyan Zhu. - 1st ed. 2022. - XVI, 129 p. 65 illus., 58 illus. in color.online resource. - SpringerBriefs in Computer Science,2191-5776. - SpringerBriefs in Computer Science,.
Chapter. 1. IoT and Supply Chain Security -- Chapter. 2. Risk Modeling and Analysis -- Chapter. 3. Risk Mitigation Decisions -- Chapter. 4. Policy Management -- Chapter. 5. Computational Tools.
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.
ISBN: 9783031084805
Standard No.: 10.1007/978-3-031-08480-5doiSubjects--Topical Terms:
569483
Risk Management.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
LDR
:03685nam a22004215i 4500
001
1082858
003
DE-He213
005
20220905191831.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031084805
$9
978-3-031-08480-5
024
7
$a
10.1007/978-3-031-08480-5
$2
doi
035
$a
978-3-031-08480-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Kieras, Timothy.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1388684
245
1 0
$a
IoT Supply Chain Security Risk Analysis and Mitigation
$h
[electronic resource] :
$b
Modeling, Computations, and Software Tools /
$c
by Timothy Kieras, Junaid Farooq, Quanyan Zhu.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XVI, 129 p. 65 illus., 58 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Computer Science,
$x
2191-5776
505
0
$a
Chapter. 1. IoT and Supply Chain Security -- Chapter. 2. Risk Modeling and Analysis -- Chapter. 3. Risk Mitigation Decisions -- Chapter. 4. Policy Management -- Chapter. 5. Computational Tools.
520
$a
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.
650
2 4
$a
Risk Management.
$3
569483
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Financial risk management.
$3
564847
650
0
$a
Cooperating objects (Computer systems).
$3
1387590
650
0
$a
Data protection.
$3
557764
700
1
$a
Zhu, Quanyan.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1114545
700
1
$a
Farooq, Junaid.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1388685
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031084799
776
0 8
$i
Printed edition:
$z
9783031084812
830
0
$a
SpringerBriefs in Computer Science,
$x
2191-5768
$3
1255334
856
4 0
$u
https://doi.org/10.1007/978-3-031-08480-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入