Building Bridges of Security, Sovereignty and Trust in Business and Industry 27th Edition | Page 22

CONTENTS
1 Introduction.................................................................................................................... 18
1.1
Digital Twin Trustworthiness and Security.......................................................................... 18
1.2
Threat Modeling Approach................................................................................................ 19
1.3
Threat Modeling Method................................................................................................... 20
1.4
Case Study Under Consideration........................................................................................ 23
2 Assets and Damage Considerations for the Attack on Digital Twins.................................. 24 3 Damage Categories and Ratings....................................................................................... 28 4 Attack Vectors, Scenarios, and Attacks Likelihood Assessment......................................... 30 5 Considerations on Risks................................................................................................... 31 6 Final Considerations........................................................................................................ 33 7 References...................................................................................................................... 34 8 Acknowledgements......................................................................................................... 34
FIGURES
Figure 1-1: Threat modeling and risk assessment method in a nutshell.................................................... 22 Figure 1-2: The architecture of the FleetTwin case study........................................................................... 24 Figure 5-1: Table with risk ratings............................................................................................................... 32 Figure 5-2: Example of risk ratings.............................................................................................................. 32 Figure 5-3: Considerations on risks.............................................................................................................. 33
TABLES
Table 1-1: Threat modeling goals depending on the technology readiness levels of digital twins............ 21 Table 2-1: The list of assets for the FleetTwin case study........................................................................... 27 Table 3-1: Damage assessment for the FleetTwin case study..................................................................... 29
17