Cyber security threat modeling for supply chain organizational environments

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Islam, Shareeful (2019) Cyber security threat modeling for supply chain organizational environments. Future Internet, 11 (3). p. 63.

[thumbnail of futureinternet-11-00063.pdf]
Preview
PDF
futureinternet-11-00063.pdf - Published Version
Available under License Creative Commons Attribution.

Download (1MB) | Preview

Abstract

Cyber security in a supply chain (SC) provides an organization the secure network facilities to meet its overall business objectives. The integration of technologies has improved business processes, increased production speed, and reduced distribution costs. However, the increased interdependencies among various supply chain stakeholders have brought many challenges including lack of third party audit mechanisms and cascading cyber threats. This has led to attacks such as the manipulation of the design specifications, alterations, and manipulation during distribution. The aim of this paper is to investigate and understand supply chain threats. In particular, the paper contributes towards modeling and analyzing CSC attacks and cyber threat reporting among supply chain stakeholders. We consider concepts such as goal, actor, attack, TTP, and threat actor relevant to the supply chain, threat model, and requirements domain, and modeled the attack using the widely known STIX threat model. The proposed model was analyzed using a running example of a smart grid case study and an algorithm to model the attack. A discrete probability method for calculating the conditional probabilities was used to determine the attack propagation and cascading effects, and the results showed that our approach effectively analyzed the threats. We have recommended a list of CSC controls to improve the overall security of the studied organization.

Item Type: Article
Identifier: 10.3390/fi11030063
Keywords: cyber supply chain; cyber security; attack modeling; smart grid; threat intelligence; threat actor
Subjects: Computing > Information security > Cyber security
Related URLs:
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 18 Jun 2021 09:15
Last Modified: 06 Feb 2024 16:06
URI: https://repository.uwl.ac.uk/id/eprint/8011

Downloads

Downloads per month over past year

Actions (login required)

View Item View Item

Menu