Seneors报告 自动化网络和隐私风险管理工具包-2021年

ID:28725

大小:3.64 MB

页数:28页

时间:2023-01-07

金币:10

上传者:战必胜
sensors
Article
Automated Cyber and Privacy Risk Management Toolkit
Gustavo Gonzalez-Granadillo
1,
* , Sofia Anna Menesidou
2
, Dimitrios Papamartzivanos
2
, Ramon Romeu
3
,
Diana Navarro-Llobet
3
, Caxton Okoh
4
, Sokratis Nifakos
5
, Christos Xenakis
6
and Emmanouil Panaousis
4

 
Citation: Gonzalez-Granadillo, G.;
Menesidou, S.A.; Papamartzivanos, D.;
Romeu, R.; Navarro-Llobet, D.;
Okoh, C.; Nifakos, S.; Xenakis, C.;
Panaousis, E. Automated Cyber and
Privacy Risk Management Toolkit.
Sensors 2021, 21, 5493. https://
doi.org/10.3390/s21165493
Academic Editors: Alexios Mylonas
and Nikolaos Pitropakis
Received: 5 July 2021
Accepted: 12 August 2021
Published: 15 August 2021
Publishers Note: MDPI stays neutral
with regard to jurisdictional claims in
published maps and institutional affil-
iations.
Copyright: © 2021 by the authors.
Licensee MDPI, Basel, Switzerland.
This article is an open access article
distributed under the terms and
conditions of the Creative Commons
Attribution (CC BY) license (https://
creativecommons.org/licenses/by/
4.0/).
1
ATOS Spain, Atos Research & Innovation, Cybersecurity Unit, 08020 Barcelona, Spain
2
UBITECH Ltd., Thessalias 8 & Etolias 10, 152 31 Chalandri, Greece; smenesidou@ubitech.eu (S.A.M.);
dpapamartz@ubitech.eu (D.P.)
3
Fundació Privada Hospital Asil de Granollers, 08402 Granollers, Spain; rromeu@fhag.es (R.R.);
diananavarro@fphag.org (D.N.-L.)
4
School of Computing and Mathematical Sciences, University of Greenwich, London SE10 9LS, UK;
c.okoh@greenwich.ac.uk (C.O.); e.panaousis@greenwich.ac.uk (E.P.)
5
Karolinska Institutet Department of Learning, Informatics, Management and Ethics, Tomtebodavägen 18b,
171 65 Solna, Sweden; sokratis.nifakos@ki.se
6
Department of Digital Systems, University of Piraeus, Karaoli ke Dimitriou 80, 185 34 Pireas, Greece;
xenakis@unipi.gr
* Correspondence: gustavo.gonzalez@atos.net
Abstract:
Addressing cyber and privacy risks has never been more critical for organisations. While a
number of risk assessment methodologies and software tools are available, it is most often the case
that one must, at least, integrate them into a holistic approach that combines several appropriate risk
sources as input to risk mitigation tools. In addition, cyber risk assessment primarily investigates
cyber risks as the consequence of vulnerabilities and threats that threaten assets of the investigated
infrastructure. In fact, cyber risk assessment is decoupled from privacy impact assessment, which
aims to detect privacy-specific threats and assess the degree of compliance with data protection
legislation. Furthermore, a Privacy Impact Assessment (PIA) is conducted in a proactive manner
during the design phase of a system, combining processing activities and their inter-dependencies
with assets, vulnerabilities, real-time threats and Personally Identifiable Information (PII) that may
occur during the dynamic life-cycle of systems. In this paper, we propose a cyber and privacy risk
management toolkit, called AMBIENT (Automated Cyber and Privacy Risk Management Toolkit)
that addresses the above challenges by implementing and integrating three distinct software tools.
AMBIENT not only assesses cyber and privacy risks in a thorough and automated manner but it
also offers decision-support capabilities, to recommend optimal safeguards using the well-known
repository of the Center for Internet Security (CIS) Controls. To the best of our knowledge, AMBIENT
is the first toolkit in the academic literature that brings together the aforementioned capabilities.
To demonstrate its use, we have created a case scenario based on information about cyber attacks
we have received from a healthcare organisation, as a reference sector that faces critical cyber and
privacy threats.
Keywords: toolkit; cybersecurity; privacy; risk assessment; risk control; healthcare
1. Introduction
Cyber Risk Management has traditionally been a fundamental challenge of every or-
ganisation that seeks ways to protect its assets against cyber threats [
1
]. This is about using
cybersecurity countermeasures (technical, operational, and physical) to prevent, detect,
and respond to cyber attacks prohibiting the exploitation of the organisation. Technical
controls can be anything from “Inventory and Control of Hardware Assets” to “ Penetra-
tion Tests and Red Team Exercises”, according to the Center for Internet Security (CIS)
Controls [
2
]. Operational controls refer to standards, policies, and frameworks adopted
Sensors 2021, 21, 5493. https://doi.org/10.3390/s21165493 https://www.mdpi.com/journal/sensors
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭