Skip to main content

Table 6. Evaluation of the prioritization schemes

From: A survey of methods supporting cyber situational awareness in the context of smart cities

References

Perspective

Threat enum

Cybersecurity scope

Uncertainty handling

Basis for prioritization

A

S

B

E

I

D

T

Li et al. [58]

✓

  

Manual

  

✓

 

Mitigation prioritization

Kelarestaghi et al. [59]

 

✓

 

Manual

 

✓

  

N/A

Impact assessment

Kotzanikolaou et al. [60]

✓

  

Manual

Not specified

 

Mitigation prioritization

Sicari et al. [62]

✓

  

Manual

 

✓

✓

 

Exploitability level

Wang et al. [63]

✓

  

Manual

  

✓

 

Threat factor

Radanliev et al. [65]

✓

  

Manual

 

✓

   

Economic impact

Nazeeruddin [66]

 

✓

 

Manual

 

✓

  

Threat factor

Shivraj [67]

✓

  

Manual

 

✓

  

Threat factor

Mohsin et al. [68]

✓

  

Manual

 

✓

✓

 

Prioritized configuration

Falco et al. [69]

✓

  

Automatic

 

✓

  

Attack path projection

Angelini et al. [70]

  

✓

Manual

Not specified

 

Operational impact

Wang et al. [71]

  

✓

Manual

 

✓

✓

 

Threat factor

Bou-Harb et al. [73]

✓

  

Automatic

 

✓

  

Situational awareness

  1. Perspective: A asset-driven, S service-driven, B business-driven. Cybersecurity scope: E exploratory threat, I infrastructure sabotage, D data manipulation, T third-party breaches. Uncertainty: —ordinal, —probabilistic, —game-theoretic