Abstract
Nowadays information technology (IT) becomes one of the core elements of global supply chains that are increasingly at risk of a disruption of their information systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Corresponding author
Problems
Problems
11.1
Design attack scenarios for correlated threat events.
11.2
Enhance the SMIP models presented in this chapter for multiple implementation levels of countermeasures, where different levels are associated with different implementation costs and different effectiveness of blocking different threats.
11.3
Modify the SMIP models presented in this chapter for selection of cybersecurity portfolio such that cannot contain mutually exclusive countermeasures or such that must contain subsets of countermeasures contingent on each other.
11.4
Relax the assumption that the blocking effectiveness of each countermeasure is independent whether or not it is used alone or together with other countermeasures. What would be the implication of that relaxation on the developed models?
11.5
Identify the best-case and the worst-case attack scenarios such that the CVaR of loss is not greater and not less than than a fixed threshold loss, respectively.
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Sawik, T. (2018). Selection of Cybersecurity Safequards Portfolio. In: Supply Chain Disruption Management Using Stochastic Mixed Integer Programming. International Series in Operations Research & Management Science, vol 256. Springer, Cham. https://doi.org/10.1007/978-3-319-58823-0_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-58823-0_11
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-58822-3
Online ISBN: 978-3-319-58823-0
eBook Packages: Business and ManagementBusiness and Management (R0)