12 research outputs found
Cyber risk assessment in cloud provider environments: Current models and future needs
Traditional frameworks for risk assessment do not work well for cloud computing. While recent work has often focussed on the risks faced by firms adopting or selecting cloud services, there has been little research on how cloud providers might assess their own services. In this paper, we use an in-depth review of the extant literature to highlight the weaknesses of traditional risk assessment frameworks for this task. Using examples, we then describe a new risk assessment model (CSCCRA) and compare this against three established approaches. For each approach, we consider its goals, the risk assessment process, decisions, the scope of the assessment and the way in which risk is conceptualised. This evaluation points to the need for dynamic models specifically designed to evaluate cloud risk. Our suggestions for future research are aimed at improving the identification, assessment, and mitigation of inter-dependent cloud risks inherent in a defined supply chain
Measuring populations' vulnerabilities for famine and food security interventions: the case of Ethiopia's Chronic Vulnerability Index
Analysis of farmers’ participation decision and its level in honey marketing in Ethiopia
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)
BIM security: A critical review and recommendations using encryption strategy and blockchain
Security of information in collaborative BIM platforms is crucial particularly for critical projects such as that of government buildings, prisons, and power plants. Inappropriate distribution and loss of sensitive information may potentially lead to physical security threats, financial loss, and loss of trust and reputation. Therefore, this paper identifies the information security requirements of collaborative BIM platforms considering the characteristics related to data security of collaborative BIM platforms through a literature review and as a result, identifies seven components of BIM security, based on which defines three levels of BIM security. Existing cybersecurity facilitating technologies such as encryption protocols, distributed database technology, and blockchain technology are reviewed to assess applicability to BIM security. This review shows that although the technologies to support BIM security are available in research and on market, they are not customized in existing collaborative BIM platforms to support BIM security. Therefore, two conceptual frameworks are proposed – (1) an encryption strategy-based framework to facilitate secure storage and distribution of BIM and (2) a blockchain-based framework to record BIM changes in a tamper-proof ledger for the non-trusting environment of construction projects. Discussions on cost and functionality are provided, which will be further extended in the future
