Threat modeling and risk assessments are common ways to identify, estimate, and prioritize risk to national, organizational, and individual operations and assets. Several threat modeling and risk assessment approaches have been proposed prior to the advent of the Internet of Things (IoT) that focus on threats and risks in information technology (IT). Due to shortcomings in these approaches and the fact that there are significant differences between the IoT and IT, we synthesize and adapt these approaches to provide a threat modeling framework that focuses on threats and risks in the IoT. In doing so, we develop an IoT attack taxonomy that describes the adversarial assets, adversarial actions, exploitable vulnerabilities, and compromised properties that are components of any IoT attack. We use this IoT attack taxonomy as the foundation for designing a joint risk assessment and maturity assessment framework that is implemented as an interactive online tool. The assessment framework this tool encodes provides organizations with specific recommendations about where resources should be devoted to mitigate risk. The usefulness of this IoT framework is highlighted by case study implementations in the context of multiple industrial manufacturing companies, and the interactive implementation of this framework is available at http://iotrisk.andrew.cmu.edu.
翻译:威胁建模和风险评估是查明、估计和优先处理国家、组织和个人业务和资产风险的常见方法。在信息技术威胁和风险互联网出现之前,提出了若干威胁建模和风险评估方法,重点是信息技术的威胁和风险。由于这些方法的缺点,以及IoT和IT之间存在巨大差异,我们综合并调整了这些方法,以提供一个威胁建模框架,侧重于IoT中的威胁和风险。我们这样做,我们开发了一个IoT攻击分类,其中描述了对抗性资产、对抗性行动、可剥削的脆弱性以及作为任何IoT攻击组成部分的受损害的特性。我们把IoT攻击分类作为设计联合风险评估和成熟度评估框架的基础,作为互动式在线工具加以实施。这一评估框架为各组织提供了具体的建议,说明应把哪些资源用于减轻风险。这个IoT框架的有用性通过多个工业制造公司的案例研究实施而得到强调。这个框架的互动式实施在 http://mutresk.andc。