Place of publication: United States, Ann Arbor; ISBN=978-0-355-28769-1
D.Engr.
Engineering Management
The George Washington University
2017
It is predicted that there will be 50 billion or more connected devices by the year 2020, ranging from connected wearable watches to smart cars and beyond. We are living in a true Internet of Things (IoT). On February 13, 2015, at the Cyber Security Summit at Stanford University in California, former President Obama announced an executive order directing more data sharing on network threats between government and businesses. Both government public sectors and U.S. companies are facing new security challenges in protecting critical infrastructures, where software applications in cloud computing platform control all IoT systems and interact in a real-time mode with existing physical environments, such as power systems, water systems, banking systems, healthcare systems, and so on. These policies are mandated to reinforce the need for holistic thinking about security and risk management at large-scale and future-proof design. The National Institute of Standards and Technology (NIST) was assigned to lead the development of a framework to reduce cyber risks to critical infrastructure called the "Cybersecurity Framework," which includes a set of standards, methodologies, procedures, best practices for information security, and processes that align policy, business, and technological approaches to address cyber risks. The NIST framework is one of the most complex IT frameworks. Implementation and governance of such a complex IT framework is an opportunity to fully utilize systems engineering processes vii (SEPs) to model this IoT security framework (NIST 2015). Both private sectors and governmental entities are responsible for making IoT a secured landscape to protect their consumers and citizens. "Additionally, civil society groups and nongovernmental organizations played key roles in the development of the Internet and continue to analyze and evaluate private-sector practices and to establish norms, expectations, and principles for online behavior. Crucially, the Internet's users must bear responsibility and learn to use tools that enable a safe and secure online experience" (Senges, Ryan, Whitt & Cerf, 2016).
Computer science
Applied sciences;Cyber physical;Internet of things;Iot security;Model-based systems engineering;Security modeling;Systems engineering