WP

W. Pieters

15 records found

More effective and efficient risk communication in the cybersecurity field needs to be designed to improve risk awareness among people and to increase resiliency. The field of cyber risk communication is relatively new, which limits the current knowledge on how to design risk com ...
Given the significant privacy and security risks of IoT devices, it seems desirable to nudge consumers towards buying more secure devices and taking privacy into account when purchasing these devices. In order to support this goal, this study has examined the effect of security a ...

Distinguishing Attacks and Failures in Industrial Control Systems

Knowledge-based Design of Bayesian Networks for Water Management Infrastructures

Water management infrastructures such as floodgates are critical and increasingly operated by Industrial Control Systems (ICS). These systems are becoming more connected to the internet, either directly or through the corporate networks. This makes them vulnerable to cyber-attack ...
The information security (IS) risk assessment process is an essential part to organisation's their protection of digital assets. However, the fast changing IS environment causes for limited knowledge of eventualities, dependencies and values of systems and phenomena. Consequently ...

Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures

Exploring the impact of cyber-defensive strategies on critical infrastructures through agent-based modelling

The increased decentralisation and heterogeneity of critical infrastructure systems pose a threat to the safe and secure operation of critical infrastructures by complicating cybersecurity procedures. The increased frequency and impact of cyberthreats have led to the desire to de ...
Cyber security is getting more attention in the last decades. Unfortunately, the 100% cyber security protection is impractical and impossible, and therefore, we need to consider other cyber risk management strategies. One of them is cyber insurance, but its adoption has been slow ...

Modelling Humanitarian Interaction

Exploring the factors that determine humanitarian interaction and the policies that influence them through agent-based modelling. The case of information security.

Humanitarian assistance is driven by data and information. Through the whole
chain of actions – from early warning systems to evaluation – information
determines priorities, resource allocation, and donors’ willingness to donate.
However, the potential harm that comes ...
Employees are often referred to as the main cause of cyber security incidents in organizations. These incidents can lead to huge company risks and enormous losses. Therefore insight in how organizations can improve employees’ information security behavior is important, realizing ...

Cyberattack-Related Cascading Effects Mitigation

A Risk-based Approach for ICS Network Segmentation Design in Chemical Plants

Cascading effects are high-impact, low-probability phenomena that have caused catastrophic impacts in various chemical and process plants around the world. With the increasing trend of cyberattacks targeting critical infrastructures, there is a concern that accidents caused by cy ...

Analysing the impact of cyber insurance on the cyber security ecosystem

Utilising agent-based modelling to explore the effects of insurance policies

Cyberattacks are a constant threat to organisations worldwide. The uncertainty and difficulty of properly conducting cyber risk management processes do not make it easier for organisations to cope with cyberattacks. Cyber insurance can be a partial solution to the dilemma that or ...

What drives cybersecurity investment?

Organizational factors and perspectives from decision-makers

One of the leading perspectives from literature is that decisions about investments should be made based on a comprehensive cost-benefit analysis and on a cyber-risk assessment. However, many organizations do not undertake this sophisticated analyses due to the lack of available ...
In the Internet of Things paradigm, everyday objects communicate with each other to form a worldwide dynamic network which provides opportunities for innovative services and applications in almost every field. Nevertheless, such a dynamic network also brings serious security issu ...
With the extensive use of the internet nowadays, companies are becoming more and more at risk from cyber-attacks. Especially SMEs are vulnerable, as they lack in cybersecurity. This is due to time, resource and knowledge constraints. In the literature no clear solutions can be fo ...