Abstract

The paper presents a novel methodology for a continuous cascade model that defines the current state of security and resilience of an Industrial Internet of Things (IIoT) system. The approach integrates system objective definition, critical process and asset identification, and hybrid threat modelling (STRIDE/LINDDUN). Identified threats are correlated with attack techniques using the MITRE ATT&CK for Industrial Control System framework (ICS), while Common Vulnerability Scoring System (CVSS) is employed for vulnerability assessment. Risk quantification adheres to ISO/IEC 27005 guidelines. The paper concludes by discussing the methodology's strengths and limitations, alongside avenues for future research.

Recommended Citation

Krzysztoń, E., Rojek, I., Mikołajewski, D. & Cybulski, J. (2025). A novel approach: continuous cascade model for assessing security and resilience in IIoTIn I. Luković, S. Bjeladinović, B. Delibašić, D. Barać, N. Iivari, E. Insfran, M. Lang, H. Linger, & C. Schneider (Eds.), Empowering the Interdisciplinary Role of ISD in Addressing Contemporary Issues in Digital Transformation: How Data Science and Generative AI Contributes to ISD (ISD2025 Proceedings). Belgrade, Serbia: University of Gdańsk, Department of Business Informatics & University of Belgrade, Faculty of Organizational Sciences. ISBN: 978-83-972632-1-5. https://doi.org/10.62036/ISD.2025.11

Paper Type

Poster

DOI

10.62036/ISD.2025.11

Share

COinS
 

A novel approach: continuous cascade model for assessing security and resilience in IIoT

The paper presents a novel methodology for a continuous cascade model that defines the current state of security and resilience of an Industrial Internet of Things (IIoT) system. The approach integrates system objective definition, critical process and asset identification, and hybrid threat modelling (STRIDE/LINDDUN). Identified threats are correlated with attack techniques using the MITRE ATT&CK for Industrial Control System framework (ICS), while Common Vulnerability Scoring System (CVSS) is employed for vulnerability assessment. Risk quantification adheres to ISO/IEC 27005 guidelines. The paper concludes by discussing the methodology's strengths and limitations, alongside avenues for future research.