001449396 000__ 06999cam\a2200601\a\4500 001449396 001__ 1449396 001449396 003__ OCoLC 001449396 005__ 20230310004358.0 001449396 006__ m\\\\\o\\d\\\\\\\\ 001449396 007__ cr\un\nnnunnun 001449396 008__ 220910s2022\\\\sz\\\\\\ob\\\\001\0\eng\d 001449396 019__ $$a1343946162 001449396 020__ $$a9783031084805$$q(electronic bk.) 001449396 020__ $$a3031084802$$q(electronic bk.) 001449396 020__ $$z9783031084799$$q(print) 001449396 020__ $$z3031084799 001449396 0247_ $$a10.1007/978-3-031-08480-5$$2doi 001449396 035__ $$aSP(OCoLC)1344158497 001449396 040__ $$aEBLCP$$beng$$epn$$cEBLCP$$dGW5XE$$dYDX$$dEBLCP$$dOCLCQ 001449396 049__ $$aISEA 001449396 050_4 $$aTK5105.8857 001449396 08204 $$a004.67/8$$223/eng/20220915 001449396 1001_ $$aKieras, Timothy. 001449396 24510 $$aIoT supply chain security risk analysis and mitigation :$$bmodeling, computations, and software tools /$$cTimothy Kieras, Junaid Farooq, Quanyan Zhu. 001449396 260__ $$aCham :$$bSpringer,$$c2022. 001449396 300__ $$a1 online resource (142 pages) 001449396 336__ $$atext$$btxt$$2rdacontent 001449396 337__ $$acomputer$$bc$$2rdamedia 001449396 338__ $$aonline resource$$bcr$$2rdacarrier 001449396 4901_ $$aSpringerBriefs in Computer Science 001449396 500__ $$a4.6.3.2 Insurance Policy Design 001449396 504__ $$aReferences-2 Risk Modeling and Analysis-2.1 Risk Scoring in Component Graphs-2.1.1 Introduction-2.1.2 Related Work-2.1.3 Contributions-2.2 System Model for Risk Assessment-2.2.1 Model Definitions-2.2.1.1 Component Security Graph-2.2.1.2 System Supplier Network-2.2.2 Supplier Trust-2.2.3 Systemic Risk Graph-2.3 Risk Analysis Metrics-2.3.1 Systemic Risk Function-2.3.2 Supplier Involvement Measure-2.4 Uncertainties in Model Development-2.4.1 Parametric Uncertainties in Probability Estimates-2.4.2 Structural Modeling Uncertainties 001449396 504__ $$aIncludes bibliographical references and index. 001449396 5050_ $$aIntro -- Preface -- Acknowledgments -- Contents -- Acronyms -- 1 IoT and Supply Chain Security -- 1.1 Vendor Landscape of IoT Systems -- 1.2 Brief Taxonomy of Supply Chain Security -- 1.3 IoT Supply Chain Risk: Hard to Observe and Hard to Control -- 1.3.1 Dissecting Supply Chain Links in IoT -- 1.4 IoT Risk Implications and Consequences -- 1.4.1 Key Features of IoT Security -- 1.5 Challenges in Cyber Supply Chain Risk Analysis of IoT -- 1.6 Supply Chain Resilience -- 1.6.1 Top-Down Approach to Managing Risk -- 1.6.2 Bottom-Up Approach to Managing Risk -- 1.7 Overview of the Book 001449396 5058_ $$a2.5 Uncertainty Case Studies -- 2.5.1 Case 0: Ground Truth -- 2.5.2 Case 1: Uncertainty of Single Node Logic -- 2.5.3 Case 2: Uncertainty of Node Omission -- 2.5.4 Case 3: Uncertainty in Edge Placement -- 2.5.5 Case 4: Uncertainty in Probability Values -- 2.6 Conclusion -- References -- 3 Risk Mitigation Decisions -- 3.1 Cost Effective Vendor Selection -- 3.1.1 Strict Supplier Choice Problem -- 3.2 Supply Chain Diversification -- 3.2.1 Component Security Risk Minimization Problem -- 3.2.2 Supplier Involvement Minimization Problem -- 3.2.3 Relaxed Supplier Choice Problem 001449396 5058_ $$a3.3 Case Study and Results -- 3.3.1 Simulation Setup -- 3.3.2 Example Scenarios and Results -- 3.3.3 Supplier Involvement Experiments -- 3.4 Conclusion -- References -- 4 Policy Management -- 4.1 Introduction -- 4.2 Literature Review -- 4.3 Accountability Models in IoT Supply Chain -- 4.3.1 Running Examples -- 4.3.2 System Modeling -- 4.3.3 Accountability Investigation -- 4.3.4 Model Extensions -- 4.3.4.1 Single Supplier with Multiple Types -- 4.3.4.2 Multiple Suppliers -- 4.4 Case Study 1: Autonomous Truck Platooning -- 4.4.1 Background -- 4.4.2 Vehicle Dynamics Model 001449396 5058_ $$a4.4.3 Accountability Testing -- 4.4.4 Parameter Analysis -- 4.4.5 Investigation Performance -- 4.4.5.1 Accountability Receiver Operating Characteristic -- 4.4.5.2 Area Under the AROC Curve -- 4.5 Case Study 2: Ransomware in IoT Supply Chain -- 4.5.1 Background -- 4.5.2 Smart Lock and Ransomware Attack -- 4.5.3 Accountability Investigation -- 4.5.3.1 Tier-1 Investigation -- 4.5.3.2 Multi-Stage Accountability Investigation -- 4.6 Compliance and Cyber Insurance -- 4.6.1 Compliance Modeling -- 4.6.2 Contract Design -- 4.6.3 Cyber Insurance -- 4.6.3.1 Background Introduction 001449396 506__ $$aAccess limited to authorized users. 001449396 520__ $$aThis SpringerBrief introduces methodologies and tools for quantitative understanding and assessment of supply chain risk to critical infrastructure systems. It unites system reliability analysis, optimization theory, detection theory and mechanism design theory to study vendor involvement in overall system security. It also provides decision support for risk mitigation. This SpringerBrief introduces I-SCRAM, a software tool to assess the risk. It enables critical infrastructure operators to make risk-informed decisions relating to the supply chain, while deploying their IT/OT and IoT systems. The authors present examples and case studies on supply chain risk assessment/mitigation of modern connected infrastructure systems such as autonomous vehicles, industrial control systems, autonomous truck platooning and more. It also discusses how vendors of different system components are involved in the overall security posture of the system and how the risk can be mitigated through vendor selection and diversification. The specific topics in this book include: Risk modeling and analysis of IoT supply chains Methodologies for risk mitigation, policy management, accountability, and cyber insurance Tutorial on a software tool for supply chain risk management of IoT These topics are supported by up-to-date summaries of the authors recent research findings. The authors introduce a taxonomy of supply chain security and discusses the future challenges and directions in securing the supply chains of IoT systems. It also focuses on the need for joint policy and technical solutions to counter the emerging risks, where technology should inform policy and policy should regulate technology development. This SpringerBrief has self-contained chapters, facilitating the readers to peruse individual topics of interest. It provides a broad understanding of the emerging field of cyber supply chain security in the context of IoT systems to academics, industry professionals and government officials. 001449396 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed September 15, 2022). 001449396 650_0 $$aInternet of things$$xSecurity measures. 001449396 650_0 $$aBusiness logistics$$xSecurity measures. 001449396 655_0 $$aElectronic books. 001449396 7001_ $$aFarooq, Junaid. 001449396 7001_ $$aZhu, Quanyan. 001449396 77608 $$iPrint version:$$aKieras, Timothy.$$tIoT Supply Chain Security Risk Analysis and Mitigation.$$dCham : Springer International Publishing AG, ©2022$$z9783031084799 001449396 830_0 $$aSpringerBriefs in computer science. 001449396 852__ $$bebk 001449396 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-031-08480-5$$zOnline Access$$91397441.1 001449396 909CO $$ooai:library.usi.edu:1449396$$pGLOBAL_SET 001449396 980__ $$aBIB 001449396 980__ $$aEBOOK 001449396 982__ $$aEbook 001449396 983__ $$aOnline 001449396 994__ $$a92$$bISE