From: A survey of methods supporting cyber situational awareness in the context of smart cities
Threat category | Interdependency models | Risk assessment and threat intelligence | Attack detection |
---|---|---|---|
Credentials theft | – | [75] | – |
Resource infiltration | – | – | |
Infrastructure tampering | – | ||
Resource overwhelming | |||
Identity manipulation | – | ||
Infection by malware | – | [75] | |
Data tampering | – | – | [86] |
Data corruption | – | ||
Data misuse | – | [63] | – |
Disruption of decision-making process | – | – | |
Overall threat factor/impact | – |