CONTENTS
1 Introduction.................................................................................................................... 18 |
1.1 |
Digital Twin Trustworthiness and Security.......................................................................... 18 |
1.2 |
Threat Modeling Approach................................................................................................ 19 |
1.3 |
Threat Modeling Method................................................................................................... 20 |
1.4 |
Case Study Under Consideration........................................................................................ 23 |
2 Assets and Damage Considerations for the Attack on Digital Twins.................................. 24 3 Damage Categories and Ratings....................................................................................... 28 4 Attack Vectors, Scenarios, and Attacks Likelihood Assessment......................................... 30 5 Considerations on Risks................................................................................................... 31 6 Final Considerations........................................................................................................ 33 7 References...................................................................................................................... 34 8 Acknowledgements......................................................................................................... 34
FIGURES
Figure 1-1: Threat modeling and risk assessment method in a nutshell.................................................... 22 Figure 1-2: The architecture of the FleetTwin case study........................................................................... 24 Figure 5-1: Table with risk ratings............................................................................................................... 32 Figure 5-2: Example of risk ratings.............................................................................................................. 32 Figure 5-3: Considerations on risks.............................................................................................................. 33
TABLES
Table 1-1: Threat modeling goals depending on the technology readiness levels of digital twins............ 21 Table 2-1: The list of assets for the FleetTwin case study........................................................................... 27 Table 3-1: Damage assessment for the FleetTwin case study..................................................................... 29
17