Evaluation of the Cyber Security Risk Models (CSRM) in Cloud Computing

Hossein Anisi
DOI: https://doi.org/10.53759/7669/jmc202202017
2022-07-05
Journal of Machine and Computing
Abstract:Many devices in the Internet of Things (IoT) ecosystem may be susceptible to cyberattacks due to their diverse nature and lack of standardization. Resource-constrained IoT devices include sensor nodes, smart gadgets, and wearable devices. An organization's RAP (Risk Assessment Process) integrates the evaluation of hazards that are linked to all its resources, as well as the evaluation and prioritization of these risks. It is crucial to begin the risk management process with an accurate and thorough risk assessment. The Cyber Security Risk Models (CSRMs) in Cloud Computing are examined in this research. To understand the uniqueness of IoT systems and why present risk assessment methodologies for IoT are ineffective, it is necessary to understand the current state of risk assessment for IoT. There are constraints to periodic evaluations IoT due to device interoperability. Continuous testing of IoT solutions is thus essential.
What problem does this paper attempt to address?