Searched for: subject%3A%22Security%22
(1 - 5 of 5)
document
de Wit, J.J. (author), Pieters, Wolter (author), van Gelder, P.H.A.J.M. (author)
Professionals working in both the physical and cybersecurity domain need to assess and evaluate security risks. As information on risks in general and security risks in particular is often imperfect and intractable, these professionals are facing a challenge in judging both likelihood and consequences, but how much do their existing...
journal article 2023
document
de Wit, J.J. (author), Pieters, Wolter (author), Jansen, S.J.T. (author), van Gelder, P.H.A.J.M. (author)
Security professionals play a decisive role in security risk decision making, with important implications for security in organisations and society. Because of this subjective input in security understanding possible biases in this process is paramount. In this paper, well known biases as observed and described in prospect theory are studied in...
journal article 2021
document
van Gelder, P.H.A.J.M. (author), Taebi, B. (author), van Ommen, J.R. (author), van de Poel, I.R. (author), Asveld, L. (author), Balkenende, R. (author), Hollmann, F. (author), van Kampen, E. (author), Krebbers, R.J. (author), de Lange, J. (author), Terwel, K.C. (author), Visser, Eelco (author)
In this paper, we provide an overview of how Safe-by-Design is conceived and applied in practice in a large number of engineering disciplines. We discuss the differences, commonalities, and possibilities for mutual learning found in those practices and identify several ways of putting those disciplinary outlooks in perspective. The considered...
journal article 2021
document
Chockalingam, S. (author), Pieters, W. (author), Teixeira, André (author), van Gelder, P.H.A.J.M. (author)
Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attacks. Abnormal behaviour in floodgates operated by ICS could be caused...
journal article 2021
document
Tervoort, Tom (author), Tuler de Oliveira, M. (author), Pieters, W. (author), van Gelder, P.H.A.J.M. (author), Olabarriaga, Silvia Delgado (author), Marquering, Henk (author)
Cyberattacks against healthcare institutions threaten patient care. The risk of being targeted by a damaging attack is increased when medical devices are used which rely on unmaintained legacy software that cannot be replaced and may have publicly known vulnerabilities. This review aims to provide insight into solutions presented in the...
journal article 2020
Searched for: subject%3A%22Security%22
(1 - 5 of 5)