Cargando…
Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture
The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT...
Autores principales: | , , , , , , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8472925/ https://www.ncbi.nlm.nih.gov/pubmed/34577264 http://dx.doi.org/10.3390/s21186057 |
_version_ | 1784574859456544768 |
---|---|
author | Masip-Bruin, Xavi Marín-Tordera, Eva Ruiz, José Jukan, Admela Trakadas, Panagiotis Cernivec, Ales Lioy, Antonio López, Diego Santos, Henrique Gonos, Antonis Silva, Ana Soriano, José Kalogiannis, Grigorios |
author_facet | Masip-Bruin, Xavi Marín-Tordera, Eva Ruiz, José Jukan, Admela Trakadas, Panagiotis Cernivec, Ales Lioy, Antonio López, Diego Santos, Henrique Gonos, Antonis Silva, Ana Soriano, José Kalogiannis, Grigorios |
author_sort | Masip-Bruin, Xavi |
collection | PubMed |
description | The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption. |
format | Online Article Text |
id | pubmed-8472925 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-84729252021-09-28 Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture Masip-Bruin, Xavi Marín-Tordera, Eva Ruiz, José Jukan, Admela Trakadas, Panagiotis Cernivec, Ales Lioy, Antonio López, Diego Santos, Henrique Gonos, Antonis Silva, Ana Soriano, José Kalogiannis, Grigorios Sensors (Basel) Review The specific demands of supply chains built upon large and complex IoT systems, make it a must to design a coordinated framework for cyber resilience provisioning, intended to guarantee trusted supply chains of ICT systems, built upon distributed, dynamic, potentially insecure, and heterogeneous ICT infrastructures. As such, the solution proposed in this paper is envisioned to deal with the whole supply chain system components, from the IoT ecosystem to the infrastructure connecting them, addressing security and privacy functionalities related to risks and vulnerabilities management, accountability, and mitigation strategies, as well as security metrics and evidence-based security assurance. In this paper, we present FISHY as a preliminary architecture that is designed to orchestrate existing and beyond state-of-the-art security appliances in composed ICT scenarios. To this end, the FISHY architecture leverages the capabilities of programmable networks and IT infrastructure through seamless orchestration and instantiation of novel security services, both in real-time and proactively. The paper also includes a thorough business analysis to go far beyond the technical benefits of a potential FISHY adoption, as well as three real-world use cases highlighting the envisioned benefits of a potential FISHY adoption. MDPI 2021-09-09 /pmc/articles/PMC8472925/ /pubmed/34577264 http://dx.doi.org/10.3390/s21186057 Text en © 2021 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Review Masip-Bruin, Xavi Marín-Tordera, Eva Ruiz, José Jukan, Admela Trakadas, Panagiotis Cernivec, Ales Lioy, Antonio López, Diego Santos, Henrique Gonos, Antonis Silva, Ana Soriano, José Kalogiannis, Grigorios Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title | Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title_full | Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title_fullStr | Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title_full_unstemmed | Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title_short | Cybersecurity in ICT Supply Chains: Key Challenges and a Relevant Architecture |
title_sort | cybersecurity in ict supply chains: key challenges and a relevant architecture |
topic | Review |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8472925/ https://www.ncbi.nlm.nih.gov/pubmed/34577264 http://dx.doi.org/10.3390/s21186057 |
work_keys_str_mv | AT masipbruinxavi cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT marintorderaeva cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT ruizjose cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT jukanadmela cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT trakadaspanagiotis cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT cernivecales cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT lioyantonio cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT lopezdiego cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT santoshenrique cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT gonosantonis cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT silvaana cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT sorianojose cybersecurityinictsupplychainskeychallengesandarelevantarchitecture AT kalogiannisgrigorios cybersecurityinictsupplychainskeychallengesandarelevantarchitecture |