Skip to main content

Responsive Cyber-Physical Risk Management (RECYPHR)

A Systems Framework

  • Conference paper
  • First Online:
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security (ICGS3 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 534))

Included in the following conference series:

  • International Conference on Global Security, Safety, and Sustainability

Abstract

Organizations are highly exposed to the vulnerabilities inherent in Internet connectivity, and the exposure increases every day as cyber-attacks become more lethal. Competitiveness demands an ever-increasing presence, and therefore reliance, on all things electronic. Over the past generation, businesses, consumers and governments around the globe have moved in to cyberspace and cloud environment in order to conduct their businesses. However, criminals have identified rewards from cyberspace frauds therefore, the risks and threats have increased too which indicate that the current risk management methodologies are inefficient and fast becoming obsolete in order to assess, manage, reduce, mitigate and accept risk in real time to effectively reduce cyber incidents. For our societies to function, securing the cyber space is essential and will be an enabler with result in better use of the digital environment. In this paper a new Responsive Cyber-Physical Risk Management Framework (RECYPHR) is proposed in order to tackle the traditional shortfalls and provide a Near Real-Time (NERT) response to managing risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Information technology –Security techniques –Information security management systems – Requirements (ISO/IEC27001:2005), English version of DIN ISO/IEC 27001:2008-09

    Google Scholar 

  2. Information technology — Security techniques —Information security management system implementation guidance IEC 27003-2010

    Google Scholar 

  3. Information technology — Security techniques —Information security management system implementation guidance, ISO/IEC 27005:2011

    Google Scholar 

  4. Risk Management – Principles and guidelines, ISO 31000:2009

    Google Scholar 

  5. Risk Management – Risk assessment techniques, IEC 31010:2009

    Google Scholar 

  6. Developing a Risk Prevention Culture in Europe, Annual Report 2002, European Agency for Safety and Health at Work, ISBN 92-9191-024-4

    Google Scholar 

  7. Railway Safety Management System Guide, Railway Safety-Transport Canada, Ottawa-Ontario, February 2001

    Google Scholar 

  8. Hessami, A.G.: Risk, a missed opportunity, risk and continuity. Int. J. Best Pract. Manag. 2(2), 17–26 (1999)

    Google Scholar 

  9. Hunter, A., Hessami, A.G.: Formalisation of weighted factors analysis. Knowl. Based Syst. 15, 377–390 (2002)

    Article  Google Scholar 

  10. Hessami, A.G.: A systems framework for safety and security—the holistic paradigm. Syst. Eng. J. USA 7(2), 99–112 (2004)

    Article  Google Scholar 

  11. Palmer, C.: Using IT for competitive advantage at Thomson Holidays. Long Range Plann. 21(6), 26–29 (Institute of Strategic Studies Journal. Pergamon Press, London, December 1988)

    Google Scholar 

  12. Hessami, A.: Safety assurance, a systems paradigm. Hazard Prev. J. Syst. Saf. Soc. 35(3), 8–13 (1999)

    Google Scholar 

  13. Hessami, A.: Risk management a systems paradigm. Syst. Eng. J. Int. Counc. Syst. Eng. 2(3), 156–167 (1999)

    Google Scholar 

  14. ISO/IEC15288, System Life Cycle Processes - ISO/IEC October 2002

    Google Scholar 

  15. Skyttner, L.: General Systems Theory, Ideas and Applications. World Scientific Publishing Co., Singapore (2001). ISBN 981-02-4176-3:88-89

    Google Scholar 

  16. Waring, A.E., Glendon, A.I.: Managing Risk-Critical Issues for Survival and Success into the 21st Century, pp. 70–86. International Thompson Business Press, (1998). ISBN 1-86152-167-7

    Google Scholar 

  17. Hessami, A.G.: Framework for safety, security and sustainability risk management. In: Soares, C.G. (ed.) Safety and Reliability of Industrial Products, Systems and Structures, pp. 21–31. CRC Press, Boca Raton (2010). ISBN 978-415-66392-2

    Google Scholar 

  18. Broadhurst, R., Grabosky, P.: Crime in Cyberspace: Offenders and the Role of Organized Crime Groups, Working Paper. http://ssrn.com/abstract=2211842 (2013)

  19. EY, Cyber program management – Identifying ways to get ahead of cybercrime, Insights on governance, risk and compliance, October 2014

    Google Scholar 

  20. Johnson, J., Sung, M.C., Ma, T.: Toward Future Cyber-Security Risk Management, Lecture note, University of Southampton. http://www.southampton.ac.uk/assets/imported/transforms/peripheral-block/UsefulDownloads_Download/D90CE65EDA3747B4A8259B30E94290BD/8%20johnson-ma-sung.pdf (2012)

  21. NCSC, Cyber Security and Risk Management – An Executive level responsibility (2013)

    Google Scholar 

  22. PwC, CSO magazine, CIO magazine, The Global State of Information Security® Survey 2014, September 2013

    Google Scholar 

  23. BS 31100, Risk Management – Code of Practice and Guidance for the Implementation of BS ISO 31000

    Google Scholar 

  24. SafeRelNet: http://maikbrehm.com/project-saferelnet.html

  25. Jahankhani, H., Al Nemrat, A.: Cybercrime classification and characteristics. In: Cybercrime and Cyber Terrorism Investigators’ Handbook, Chap. 4. Elsevier, Amsterdam, July 2014. ISBN 978-0-12-800743-3

    Google Scholar 

  26. Jahankhani, H, Al Nemrat, A.: Cybercrime profiling and trend analysis. In: Intelligence Management: Knowledge Driven Frameworks for Combating Terrorism and Organised Crime, Chap. 12, pp. 181–195. Springer, Berlin (2011). ISBN 978-1-4471-2139-8

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. G. Hessami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Hessami, A.G., Jahankhani, H., Nkhoma, M. (2015). Responsive Cyber-Physical Risk Management (RECYPHR). In: Jahankhani, H., Carlile, A., Akhgar, B., Taal, A., Hessami, A., Hosseinian-Far, A. (eds) Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber Security. ICGS3 2015. Communications in Computer and Information Science, vol 534. Springer, Cham. https://doi.org/10.1007/978-3-319-23276-8_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-23276-8_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-23275-1

  • Online ISBN: 978-3-319-23276-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics