Language:
English
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
Record Type:
Language materials, printed : Monograph/item
Title/Author:
IoT Supply Chain Security Risk Analysis and Mitigation/ by Timothy Kieras, Junaid Farooq, Quanyan Zhu.
Reminder of title:
Modeling, Computations, and Software Tools /
Author:
Kieras, Timothy.
other author:
Farooq, Junaid.
Description:
XVI, 129 p. 65 illus., 58 illus. in color.online resource. :
Contained By:
Springer Nature eBook
Subject:
Data protection. -
Online resource:
https://doi.org/10.1007/978-3-031-08480-5
ISBN:
9783031084805
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
Kieras, Timothy.
IoT Supply Chain Security Risk Analysis and Mitigation
Modeling, Computations, and Software Tools /[electronic resource] :by Timothy Kieras, Junaid Farooq, Quanyan Zhu. - 1st ed. 2022. - XVI, 129 p. 65 illus., 58 illus. in color.online resource. - SpringerBriefs in Computer Science,2191-5776. - SpringerBriefs in Computer Science,.
Chapter. 1. IoT and Supply Chain Security -- Chapter. 2. Risk Modeling and Analysis -- Chapter. 3. Risk Mitigation Decisions -- Chapter. 4. Policy Management -- Chapter. 5. Computational Tools.
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.
ISBN: 9783031084805
Standard No.: 10.1007/978-3-031-08480-5doiSubjects--Topical Terms:
557764
Data protection.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
IoT Supply Chain Security Risk Analysis and Mitigation = Modeling, Computations, and Software Tools /
LDR
:03685nam a22004215i 4500
001
1082858
003
DE-He213
005
20220905191831.0
007
cr nn 008mamaa
008
221228s2022 sz | s |||| 0|eng d
020
$a
9783031084805
$9
978-3-031-08480-5
024
7
$a
10.1007/978-3-031-08480-5
$2
doi
035
$a
978-3-031-08480-5
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Kieras, Timothy.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1388684
245
1 0
$a
IoT Supply Chain Security Risk Analysis and Mitigation
$h
[electronic resource] :
$b
Modeling, Computations, and Software Tools /
$c
by Timothy Kieras, Junaid Farooq, Quanyan Zhu.
250
$a
1st ed. 2022.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2022.
300
$a
XVI, 129 p. 65 illus., 58 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
490
1
$a
SpringerBriefs in Computer Science,
$x
2191-5776
505
0
$a
Chapter. 1. IoT and Supply Chain Security -- Chapter. 2. Risk Modeling and Analysis -- Chapter. 3. Risk Mitigation Decisions -- Chapter. 4. Policy Management -- Chapter. 5. Computational Tools.
520
$a
This SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors’ recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials.
650
0
$a
Data protection.
$3
557764
650
0
$a
Cooperating objects (Computer systems).
$3
1387590
650
0
$a
Financial risk management.
$3
564847
650
1 4
$a
Data and Information Security.
$3
1365785
650
2 4
$a
Cyber-Physical Systems.
$3
1387591
650
2 4
$a
Risk Management.
$3
569483
700
1
$a
Farooq, Junaid.
$e
author.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1388685
700
1
$a
Zhu, Quanyan.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1114545
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783031084799
776
0 8
$i
Printed edition:
$z
9783031084812
830
0
$a
SpringerBriefs in Computer Science,
$x
2191-5768
$3
1255334
856
4 0
$u
https://doi.org/10.1007/978-3-031-08480-5
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login