Skip to main content

Part of the book series: International Series in Operations Research & Management Science ((ISOR,volume 256))

  • 1169 Accesses

Abstract

Nowadays information technology (IT) becomes one of the core elements of global supply chains that are increasingly at risk of a disruption of their information systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tadeusz Sawik .

Problems

Problems

11.1

Design attack scenarios for correlated threat events.

11.2

Enhance the SMIP models presented in this chapter for multiple implementation levels of countermeasures, where different levels are associated with different implementation costs and different effectiveness of blocking different threats.

11.3

Modify the SMIP models presented in this chapter for selection of cybersecurity portfolio such that cannot contain mutually exclusive countermeasures or such that must contain subsets of countermeasures contingent on each other.

11.4

Relax the assumption that the blocking effectiveness of each countermeasure is independent whether or not it is used alone or together with other countermeasures. What would be the implication of that relaxation on the developed models?

11.5

Identify the best-case and the worst-case attack scenarios such that the CVaR of loss is not greater and not less than than a fixed threshold loss, respectively.

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Sawik, T. (2018). Selection of Cybersecurity Safequards Portfolio. In: Supply Chain Disruption Management Using Stochastic Mixed Integer Programming. International Series in Operations Research & Management Science, vol 256. Springer, Cham. https://doi.org/10.1007/978-3-319-58823-0_11

Download citation

Publish with us

Policies and ethics