We discuss how to merge digital twins and adversary emulation to proactively manage risk in an ICT infrastructure under attack by threat actors. The infrastructure twin describes the modules, their vulnerabilities, and the attacks. An actor twin describes its attack surface, its goals, how it selects attacks and handles their failures. A platform uses the twins to simulate the actors and predicts their attack paths and the infrastructure reaction without disturbing the infrastructure. Multiple simulations cover stochastic factors such as attack success or failure. The prediction of attacks supports the selection and the validation of countermeasures to deploy. A critical advantage of a twin-based approach is that it can support a continuous...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
Cyber-physical systems (CPSs) may constitute an attractive attack target due to the increased networ...
We discuss how to merge digital twins and adversary emulation to proactively manage risk in an ICT i...
AbstractDigital twins are virtual replicas to simulate the behavior of physical devices before they ...
Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform ...
In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems ...
The Haruspex suite is an integrated set of tools that adopts a scenario approach to automate ICT ri...
The past years have witnessed an increasing interest and concern regarding the development of securi...
Cyber-physical systems underpin many of our society’s critical infrastructures. Ensuring their cyber...
While industrial environments are increasingly equipped with sensors and integrated to enterprise ne...
Although there are numerous advantages of the IoT in industrial use, there are also some security pr...
With the number of Internet-connected devices (things), expected to be almost 30 billion by 2030, th...
This contribution presents a model for cyber-resilience of Critical Cyber Infrastructures (CCI) base...
© 2010-2012 IEEE. The increased rate of cyber-attacks on the power system necessitates the need for ...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
Cyber-physical systems (CPSs) may constitute an attractive attack target due to the increased networ...
We discuss how to merge digital twins and adversary emulation to proactively manage risk in an ICT i...
AbstractDigital twins are virtual replicas to simulate the behavior of physical devices before they ...
Understanding cybersecurity threats, attacks, and incidents is crucial for organizations to perform ...
In recent years, the cybersecurity attacks on the internet of things (IoT)-based healthcare systems ...
The Haruspex suite is an integrated set of tools that adopts a scenario approach to automate ICT ri...
The past years have witnessed an increasing interest and concern regarding the development of securi...
Cyber-physical systems underpin many of our society’s critical infrastructures. Ensuring their cyber...
While industrial environments are increasingly equipped with sensors and integrated to enterprise ne...
Although there are numerous advantages of the IoT in industrial use, there are also some security pr...
With the number of Internet-connected devices (things), expected to be almost 30 billion by 2030, th...
This contribution presents a model for cyber-resilience of Critical Cyber Infrastructures (CCI) base...
© 2010-2012 IEEE. The increased rate of cyber-attacks on the power system necessitates the need for ...
A countermeasure is any change to a system to reduce the probability it is successfully attacked. We...
We describe a model-based approach to select cost-effective countermeasures for an information and c...
Cyber-physical systems (CPSs) may constitute an attractive attack target due to the increased networ...