Dec. 22, 2022, 2:10 a.m. | Rishikesh Sahay, D.A.Sepulveda Estay, Weizhi Meng, Christian D. Jensen, Michael Bruhn Barfod

cs.CR updates on arXiv.org arxiv.org

The widespread use of software-intensive cyber systems in critical
infrastructures such as ships (CyberShips) has brought huge benefits, yet it
has also opened new avenues for cyber attacks to potentially disrupt
operations. Cyber risk assessment plays a vital role in identifying cyber
threats and vulnerabilities that can be exploited to compromise cyber systems.
A number of methodologies have been proposed to carry out these analyses. This
paper evaluates and compares the application of three risk assessment
methodologies: system theoretic process …

analysis risk risk analysis sec stride system

Sr. Product Manager

@ MixMode | Remote, US

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

PNT/NAVWAR Space Electronic Warfare Instructor II – Officer Training Course

@ Aleut Federal | Colorado Springs, Colorado, United States

Sr Director, Cybersecurity SIRT

@ Workday | USA, VA, McLean