1. Introduction
In recent times, there has been a steady increase in the emphasis on cybersecurity across various sectors, including private, public, and defense domains internationally. The U.S. Department of Defense is strengthening cybersecurity by developing the RMF (Risk Management Framework) as a next-generation cybersecurity framework and applying it to the entire life cycle of defense systems along with cybersecurity T&E (Test and Evaluation). Similarly, in South Korea, various security measures are being implemented at different stages of the defense system’s acquisition and operation. These measures include “reliability testing”, “interoperability assessment”, “security strategy review”, “security measurement”, “vulnerability analysis and evaluation”, and more. Different institutions are applying diverse security protocols to address potential cyber threats effectively.
In recent times, notable cybersecurity frameworks applied to defense systems within the international community include the United States’ RMF and cybersecurity T&E methodologies. These global trends are actively underway to enhance the cybersecurity of defense systems. As an illustrative example, ref. [
1] proposed a mission-based cybersecurity T&E model integrated with the RMF for domestic application. Furthermore, ref. [
2] introduced the concept of the Multi-Cyber Range, which amalgamates cyber ranges operated by each branch of the military to establish a comprehensive and immersive cyber training facility. This model aims to heighten fidelity and realism, facilitating three-dimensional joint training and interoperability assessments.
In addition, ref. [
3] developed cybersecurity in the IoT environment, which is widely used in vehicles, industrial control, medical care, and national defense. For this, active research is in progress, such as proposing and simulating ransomware detection techniques.
Research on the application of mission-based cybersecurity T&E, in association with RMF and utilizing the Multi-Cyber Range, suggests a model that can be implemented by countries adhering to the RMF on an international scale. This model facilitates the execution of cybersecurity T&E procedures for defense system acquisition, enabling a more comprehensive assessment process within the Multi-Cyber Range environment.
The proposed model in this paper consists of four sequential stages, with each stage leveraging the utilization of the Multi-Cyber Range. In this paper, we define the proposed four-step process of the mission support system, focusing on a virtual defense system. During this process, we perform simulated experiments utilizing a cyber attack simulation system, specifically focused on the operational framework of the Multi-Cyber Range. These experiments are conducted based on a resource-depletion type of malicious code attack scenario. The role of the Multi-Cyber Range in this paper is to conduct simulated experiments using the same cyber attack simulation system utilized in [
2].
The simulated experiments using the cyber attack simulation system are conducted throughout the proposed model’s stages, specifically from the third to the fourth stage, totaling four iterations. During the four iterations of simulated experiments, the evaluation assesses the severity of identified vulnerabilities, derives optimal protective measures, and verifies the effectiveness of the applied security measures. With confidence, we believe that these simulated experiments will demonstrate the same level of effectiveness when the proposed model is applied within the Multi-Cyber Range environment.
Following the introduction in
Section 1,
Section 2 discusses relevant studies, while
Section 3 proposes the Multi-Cyber Range application model for cybersecurity T&E in association with the RMF. Subsequently,
Section 4 describes the simulated experiments on a virtual mission support system, a representative defense system, to validate its effectiveness.
In
Section 5, this paper presents its contributions, limitations, and future research directions.
2. Related Works
The related works within this study delve into the fundamental concepts and processes of the United States’ cybersecurity framework, known as the RMF, as well as the domain of cybersecurity T&E. These form the foundational backdrop against which the model proposed in this paper is situated. Furthermore, this section explores the pivotal concept of the Multi-Cyber Range, which serves as a central theme in our research. In addition to these discussions, we delve into the domain of MBCRA (Mission-based Cyber Risk Assessment). Here, we bring to light a significant issue: the existing guidelines in this area often lack specific execution methodologies. This underscores the paramount importance of the evaluation model and methodology that we concretize in this paper. They provide a solid foundation for deeper research in this field, emphasizing the need for a more comprehensive and practical approach.
2.3. The Multi-Cyber Range
According to the NIST (National Institute of Standards and Technology) in the United States, a cyber range is defined as an interactive simulation of an organization’s local network, systems, tools, and applications. It provides a secure and lawful environment for acquiring real-world cybersecurity skills and conducting safe environments for development and security testing [
12].
DARPA in the United States has been operating a cyber training range since 2009 and has further developed to facilitate its use in actual training and test evaluation, and the test space in the security area is connected to the cyber range to provide training and test evaluation in a multi-level security environment [
13].
The cyber range was built to train procedures for analyzing threats in real-world environments based on cyber threat scenarios in a more real-world cyber–physical environment rather than a theoretical approach to cybersecurity education [
14]. In addition to this, the cyber range was built with a mixture of physical equipment, simulation models, and emulation models to develop a distributed intrusion detection system applied to the industrial control system environment [
15].
This Multi-Cyber Range comprehensively simulates the Joint Chiefs of Staff’s battlefield environment and each military branch’s tactical environment, enabling realistic and comprehensive assessments.
The Multi-Cyber Range is designed with a focus on the Joint Chiefs of Staff’s battlefield environment, where various sub-systems are interconnected using the LVC (Live Virtual Constructive) concept. This design facilitates mission-based cybersecurity training and defense system testing and evaluation, providing the capability to conduct comprehensive assessments. The Multi-Cyber Range concept involves the interconnection and information exchange among sub-ranges in a manner that closely resembles real-world environments.
The Multi-Cyber Range is composed of a main range and several sub-ranges. The main range facilitates training and evaluation activities, interconnecting with multiple sub-ranges while sharing resource states. Additionally, the sub-ranges are designed to operate independently, providing flexibility in their operations. The main range utilizes the Range Management Channel to oversee the management of sub-ranges, while the CDS (Cross-Domain Solution) securely controls the exchange of information through the Packet Flow Channel to accurately reflect the operational environment.
Figure 2 illustrates the concept of interconnection and network within the Multi-Cyber Range in this paper.
It is proposed that by constructing the Multi-Cyber Range to closely resemble real-world training environments, it enables practical training effectiveness and facilitates the evaluation of defense system acquisition’s interoperability during real-world scenarios. This paper suggests a hybrid approach that enhances efficiency by collecting actual operational traffic for training and interoperability evaluation. This approach involves the integration of a red team’s attack activities to create a realistic operational environment. Based on the consideration that interoperability evaluation is feasible, it is deemed possible to extend this capability for RMF assessment. Therefore, in this study, a model is proposed for conducting mission-based cybersecurity T&E within the Multi-Cyber Range.
In recent similar research cases, for IoT devices, due to the diversity of vendors, architectures, firmware, and other hardware, it has been proposed to construct a hybrid cyber range for IoT security. This hybrid approach combines digital emulators and actual hardware to enhance the effectiveness of IoT security testing and evaluation [
16].
This form will serve as a valuable reference model for the Multi-Cyber Range in various defense systems composed of diverse embedded devices.
In addition, active research is being conducted on creating simulation environments for secure cybersecurity testing and evaluation in advanced connected cars, using virtual machines to assess security measures in a real-life environment. This demonstrates the ongoing efforts to establish realistic cybersecurity T&E environments [
17].
4. The Multi-Cyber Range Simulation for Virtual “Mission Support System”
In this chapter, a virtual defense system, “Mission Support System” is defined, and a simulation experiment is conducted to apply cybersecurity T&E associated with the RMF to the Multi-Cyber Range. The simulation in this paper replaces the Multi-Cyber Range and uses the same cyber attack simulation system as the simulation method conducted in [
2]. The mission support system, a virtual defense system, is defined to be “a system that requests operational support effectively from lower echelons to upper echelons using enemy information and target information” to identify missions, operational tasks, functions, and assets. Based on this, the procedure of the proposed model is performed step by step.
Phase 1, threat modeling, performs RMF security classification, identifies threats by layer of the mission support system, and identifies expected threat scenarios. Phase 2, attack surface cataloging, specifies the RMF security control items and attack surface. Phase 3, attack surface-based vulnerability testing and evaluation in the Multi-Cyber Range, identifies vulnerabilities on the attack surface and conducts first and second simulations of resource depletion-type malicious code attack scenarios using a simulation system. Through this, the mission impact is derived by identifying vulnerable assets, functions, operational tasks, and missions. Through the third simulation, possible protection measures against cyber threats are reviewed to derive the optimal protection measures. In phase 4, simulated penetration based on ROE in the Multi-Cyber Range, the effectiveness of the protection measures is verified by conducting the fourth simulation experiment with the previously identified threat scenarios as the rules of engagement and with the protection measures in place.
The specific details of each step are as follows.
4.3. Attack Surface-Oriented Vulnerability Analysis and Evaluation
In the third phase, vulnerability analysis and evaluation on the attack surface of the mission support system identifies vulnerabilities, and simulates a threat scenario in which a resource depletion-type malware attack occurs, targeting the attack surface in the cyber attack simulation system.
Connectable paths are identified for each hierarchical node of the mission support system, and random weights are assigned to each path as shown in
Table 4, considering the characteristics of the mission.
In order to evaluate the impact on the mission of each asset node, a correlation matrix, such as Equations (1)–(3), is defined.
In this case,
means the degree of influence of elements of set X on elements of set Y. In order to determine the influence of the lower node from the viewpoint of the upper node, the normalization process as shown in Equation (4) is performed.
Equations (5)–(7) show the effect of operational tasks on missions, functions on operational tasks, and assets on functions, respectively.
The impact of the asset on the mission can be calculated as in Equation (8), and the result is as in Equation (9).
From this, it can be seen that the asset that has the most impact on the mission is A3, and the asset that has the least impact is A4. In this paper, the impact on the mission is quantified by generating an IER (information exchange requirement) according to the degree of influence from the lower node to the upper node.
Figure 6 shows the amount of IER received from the asset node to the functional node. The asset node generates an IER equal to the weight of each function X 10 Kbps (exponential distribution), and it is the result of measuring the average IER received per function.
Table 5 shows the statistical values of IERs received by functional nodes from asset nodes. As a result of the simulation, it can be confirmed that all functional nodes receive IERs of about 10 kbps.
Figure 7 shows the IER received by the task nodes from the function nodes.
The function node forwards IER X weight X 10 kbps received from the asset node to the task node. Therefore, the task node must receive an IER of about 10 kbps in the normal state. As a result of the simulation, it can be confirmed that all operational task nodes receive an IER of 10 kbps on average.
Figure 8 is the result of measuring the IER received by the task node for each task node.
The line is the average IER received by the task node for each operational task node, and the point is the instantaneous IER value. As a result of the measurement, it can be confirmed that the task node normally receives an IER of about 3.3 kbps for each operation task node. The second simulation test uses the identified attack surface to perform a resource depletion-type malware attack; measures the IER of each node; identifies vulnerable assets, functions, operational tasks, and missions; and derives the impact on the mission.
Figure 9 is the IER of a mission node under malware attack.
Through Equation (9), a resource depletion-type malware attack is performed on A1 and A3, which are the assets that have the highest impact on the mission, and the IER reception amount of the mission node is shown in
Figure 9.
Comparing
Figure 8 and
Figure 9, it can be seen that when asset 1 and asset 3 are attacked, operational tasks T2 and T3 are most affected.
Figure 10 shows the amount of IERs received by mission nodes and operational task nodes with and without cyber attacks.
As a result of the simulation, when A1 and A3 were attacked, it was confirmed that the IER reception decreased by about 44.61% compared to the normal state (average IER reception in the steady state: 9655 bps, attack state: 5348 bps), and through this, the performance of the mission support system decreased to 56% compared to the normal state. In addition, it can be seen that T2 and T3 are most affected when subjected to a cyber attack.
Table 6 statistically shows the operation task and the IER reception of the mission node in the normal state without a cyber attack and the state in which a cyber attack occurred.
The third simulation experiment is conducted by supplementing the protection measures that can mitigate the impact of missions on resource depletion-type malicious code attacks, and through this, the optimal protection measures are derived. As protection measures to respond to resource depletion-type malicious codes, protection systems such as interlocking sections (e.g., firewall) and terminal protection systems such as anti-virus systems are classified and proposed as protection measures.
Figure 11 is a configuration diagram supplemented with protective measures.
Figure 12 is the result of measuring the IER received by the mission node from the operational task node when the derived protection measures are applied.
As a result of the simulation, it can be confirmed that it is difficult to defend against attacks from resource depletion-type malicious codes with only the protection system of the interlocking section. It can be seen that the method of reinforcing the countermeasure against resource depletion-type malicious code is the method of detecting and blocking abnormal behavior at the terminal node where the attack surface exists. Based on these results, the optimal protection measures are selected and the RMF security control items are supplemented.
Author Contributions
Conceptualization, I.K., M.P. and D.S.; Methodology, I.K., M.P., J.J. and D.S.; Software, I.K., M.P. and H.-J.L.; Validation, I.K., M.P., H.-J.L., J.J., S.L. and D.S.; Formal analysis, I.K., M.P., H.-J.L., J.J. and S.L.; Investigation, I.K., H.-J.L., J.J. and S.L.; Writing—original draft, I.K.; Writing—review & editing, D.S.; Supervision, D.S.; Project administration, D.S.; Funding acquisition, D.S. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. 2022R1F1A1074773).
Data Availability Statement
The data presented in this study are available in article.
Conflicts of Interest
The authors declare no conflict of interest.
Dual-use Research Statement
This paper investigates Multi-Cyber Range and cybersecurity test and evaluation methodologies. This study is limited to providing some theoretical and experimental support for the development of cybersecurity test and evaluation models and does not pose any threat to cybersecurity or national security. This research is limited to academic areas that are beneficial for cybersecurity advancement. There is no risk to the general public. As an ethical responsibility, we strictly adhere to relevant national and international laws about dual-use research and we have considered and adhered to these regulations in our paper.
References
- Kim, I.; Kim, S.; Kim, H.; Shin, D. Mission-Based Cybersecurity Test and Evaluation of Weapon Systems in Association with Risk Management Framework. Symmetry 2022, 14, 2361. [Google Scholar] [CrossRef]
- Park, M.; Lee, H.; Kim, Y.; Kim, K.; Shin, D. Design and Implementation of Multi-Cyber Range for Cyber Training and Testing. Appl. Sci. 2022, 12, 12546. [Google Scholar] [CrossRef]
- Khalid Alkahtani, H.; Mahmood, K.; Khalid, M.; Othman, M.; Al Duhayyim, M.; Osman, A.E.; Alneil, A.A.; Zamani, A.S. Optimal Graph Convolutional Neural Network-Based Ransomware Detection for Cybersecurity in IoT Environment. Appl. Sci. 2023, 13, 5167. [Google Scholar] [CrossRef]
- NIST. Risk Management Framework for Information Systems and Organizations; NIST SP 800-37 Rev.2; NIST: Gaithersburg, MD, USA, 2018.
- NIST. Artificial Intelligence Risk Management Framework (AI RMF 1.0); NIST: Gaithersburg, MD, USA, 2023.
- Mun, J.; Housel, T. Artificial Intelligence and Machine Learning Applications to Navy Ships: Cybersecurity and Risk Management. Nav. Eng. J. 2023, 135, 1. [Google Scholar]
- Melaku, H.M. Context-Based and Adaptive Cybersecurity Risk Management Framework. Risks 2023, 11, 101. [Google Scholar] [CrossRef]
- Parsons, E.K.; Panaousis, E.; Loukas, G.; Sakellari, G. A Survey on Cyber Risk Management for the Internet of Things. Appl. Sci. 2023, 13, 9032. [Google Scholar] [CrossRef]
- Department of Defense. Cybersecurity Test and Evaluation Guidebook, Version 2.0 Change 1; U.S. Department of Defense: Arlington, VA, USA, 2020. Available online: https://daytonaero.com/wp-content/uploads/DOD_Cybersecurity-Test-and-Evaluation-Guidebook-Version2-C1_10-Feb-2020.pdf (accessed on 17 August 2023).
- Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT). Available online: https://media.dau.edu/media/Cybersecurity+and+Acquisition+Lifecycle+Integration+Tool+%28CALIT%29/0_f8rabm9y (accessed on 18 August 2023).
- Whatmore, K. Cyber Resiliency Office for Weapon Systems: Systems Security Engineering Cyber Guidebook Version 4.0; Defense Technical Information Center: Fort Belvoir, VA, USA, 2021. [Google Scholar]
- NIST. National Initiative for Cybersecurity Education (NICE); NICE One Pager for Cyber Ranges; NIST: Gaithersburg, MD, USA, 2017.
- Oikonomou, N.; Mengidis, N.; Spanopoulos-Karalexidis, M.; Voulgaridis, A.; Merialdo, M.; Raisr, L.; Hanson, K.; Vallee, P.L.; Tsikrika, T.; Vrochidis, S.; et al. ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber Ranges. In Proceedings of the 2021 IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece, 26–28 July 2021. [Google Scholar]
- Cruz, T.; Simões, P. Down the Rabbit Hole: Fostering Active Learning through Guided Exploration of a SCADA Cyber Range. Appl. Sci. 2021, 11, 9509. [Google Scholar] [CrossRef]
- Cruz, T.; Rosa, L.; Proença, J.; Maglaras, L.; Aubigny, M.; Lev, L.; Jiang, J.; Simoes, P. A cybersecurity detection framework for supervisory control and data acquisition systems. IEEE Trans. Ind. Inform. 2016, 12, 2236–2246. [Google Scholar] [CrossRef]
- Balto, K.E.; Yamin, M.M.; Shalaginov, A.; Katt, B. Hybrid IoT Cyber Range. Sensors 2023, 23, 3071. [Google Scholar] [CrossRef] [PubMed]
- Lee, D.-H.; Kim, C.-M.; Song, H.-S.; Lee, Y.-H.; Chung, W.-S. Simulation-Based Cybersecurity Testing and Evaluation Method for Connected Car V2X Application Using Virtual Machine. Sensors 2023, 23, 1421. [Google Scholar] [CrossRef] [PubMed]
- de Naray, R.K.; Buytendyk, A.M. Analysis of Mission Based Cyber Risk Assessments (MBCRAs) Usage in DoDs Cyber Test and Evaluation; Institute for Defense Analyses: Alexandria, VA, USA, 2022. [Google Scholar]
- NIST. Guide for Mapping Types of Information and Information Systems to Security Categories; NIST SP 800-60 Rev.1; NIST: Gaithersburg, MD, USA, 2008.
- NIST. Security & Privacy Controls for Federal Information Systems and Organizations; NIST SP 800-53 Rev.4; NIST: Gaithersburg, MD, USA, 2013.
- Chouliaras, N.; Kittes, G.; Kantzavelou, I.; Maglaras, L.; Pantziou, G.; Ferrag, M.A. Cyber Ranges and TestBeds for Education, Training, and Research. Appl. Sci. 2021, 11, 1809. [Google Scholar] [CrossRef]
Figure 1.
U.S. military’s cybersecurity activities by phase of defense system development.
Figure 2.
Networking architecture for connecting ranges.
Figure 3.
Conceptual diagram of the Multi-Cyber Range application of cybersecurity T&E in association with RMF.
Figure 4.
Classification of mission support system layer into the Multi-Cyber Range.
Figure 5.
Attack surface shown in the Multi-Cyber Range, inflow path, and path through which cyber threats can propagate.
Figure 6.
Received IER volume per function sent by assets.
Figure 7.
IER volume received to task nodes sent by function nodes.
Figure 8.
IER volume received by mission node at normal state. (Line means average value and dot means instant value.).
Figure 9.
IER volume received by mission node when asset 1 and 3 are compromised by malware attack. (Line means average value and dot means instant value.).
Figure 10.
(a) Received IER at mission node. (b) Received IER at Task1 node. (c) Received IER at Task2 node. (d) Received IER at Task3 node. (Blue line is normal situation and red line is cyber attack situation).
Figure 11.
Configuration diagram supplemented with protective measures.
Figure 12.
(a) Interlocking section protection measures such as firewall. (b) Protection measures for terminals such as anti-virus.
Figure 13.
IER volume received by mission node after applying protection measures.
Table 1.
Comparison of characteristics of defense system cybersecurity systems.
Division | RMF | T&E | MBCRA |
---|
Evaluation focus | Security controls | Vulnerability, Penetration test | Risk assessment |
Factors to consider | Security level | Security Requirements | Environment, Mission |
Evaluation results | Approve/ Disapprove | Fit/Not Fit | Priority |
Methodology | Provide criteria | Not presented | Not presented |
Cooperation | Not presented | Not presented | Not presented |
Table 2.
Classification of “Mission support system” by hierarchy.
Division | Content/Threat | Mission Range |
---|
Mission | M1 | Emergency dispatch order | Main |
Operational Task | T1 | Request to upper department | Main |
T2 | Division request review | Sub |
T3 | Legion request review | Sub |
Function | F1 | Operational environment analysis | Main |
F2 | Target identification | Main |
F3 | Request decision | Main |
F4 | Fill out the request form | Main |
F5 | Request a request form | Sub |
Asset | A1 | Regiment server/malware | Sub |
A2 | Regimental commander PC/malware | Sub |
A3 | Division server/malware | Sub |
A4 | Ally information | Main |
A5 | Enemy information | Main |
A6 | Target information | Main |
Table 3.
Selected security control items.
Division | Details | Count |
---|
Access Control | AC-1~8, AC-10~12, AC-14, AC-17~22 | 18 |
Awareness and Training | AT-1~4 | 4 |
Audit and Accountability | AU-1~12 | 12 |
Security Assessment and Authorization | CA-1~3, CA-5~9 | 8 |
Configuration Management | CM-1~11 | 11 |
Contingency Planning | CP-1~4, CP-6~10 | 9 |
Identification and Authentication | IA-1~8 | 8 |
Incident Response | IR-1~8 | 8 |
Maintenance | MA-1~6 | 6 |
Media Protection | MP-1~7 | 7 |
Physical and Environmental Protection | PE-1~6, PE-8~18 | 17 |
Planning | PL-1~2, PL-4, PL-8 | 4 |
Personnel security | PS-1~8 | 8 |
Risk Assessment | RA-1~3, RA-5 | 4 |
System and Service Acquisition | SA-1~5, SA-8~12, SA-15~17 | 13 |
System and Communications Protection | SC-1~5, SA-7~8, SA-10, SA-12~13, SA-15, SA-17~24, SA-28, SA-39 | 21 |
System and Information Integrity | SI-1~8, SI-10~12, SI-16 | 12 |
Total | | 169 |
Table 4.
Weight by node path.
Node Path | Weight |
---|
A1 → (F1, F2, F3, F4, F5) | 0.1, 0.1, 0.2, 0.2, 0.4 |
A2 → (F3, F4) | 0.6, 0.4 |
A3 → (F5) | 1 |
A4 → (F1, F3, F5) | 0.4, 0.4, 0.2 |
A5 → (F1, F2, F4, F5) | 0.3, 0.3, 0.3, 0.1 |
A6 → (F1, F2, F3, F4) | 0.2, 0.2, 0.3, 0.3 |
F1 → (T1) | 1 |
F2 → (T1) | 1 |
F3 → (T1) | 1 |
F4 → (T1, T2, T3) | 0.4, 0.3, 0.3 |
F5 → (T2, T3) | 0.5, 0.5 |
T1 → (M1) | 1 |
T2 → (M1) | 1 |
T3 → (M1) | 1 |
Table 5.
Statistics of received IERs per function sent by assets.
Function | Received IER (Average) | Received IER (95% Percentile) |
---|
F1 | 9996.72 bps | 9560.62~10,415.10 bps |
F2 | 9666.64 bps | 8770.88~10,452.53 bps |
F3 | 10,689.82 bps | 9925.04~11,467.84 bps |
F4 | 9781.26 bps | 8956.02~10,566.29 bps |
F5 | 10,442.90 bps | 9724.00~11,198.19 bps |
Table 6.
Statistics of received IER with and without cyber attack.
Nodes | Normal Situation | Cyber Attack Situation | Ratio |
---|
Mission Node | 9665.63 bps | 5348.12 bps | 55.39% |
T1 Node | 10,416.31 bps | 9124.12 bps | 87.60% |
T2 Node | 10,689.82 bps | 4259.96 bps | 39.85% |
T3 Node | 9862.49 bps | 4004.18 bps | 40.60% |
Table 7.
Comparison of strengths of previous studies and the proposed model.
Division | Key Feature by Model | Strength |
---|
[1] | In conjunction with RMF Cybersecurity Test Assessment | Evaluated via performance calculation |
[2] | Interoperability evaluation using the Multi-Cyber Range | Practical cyber training and evaluation concurrently |
Proposal | Cybersecurity evaluation using RMF, the Multi-Cyber Range | Simulation evaluation close to real environment |
Table 8.
Comparison of strengths of previous studies and the proposed model.
Division | [1] | [2] | Proposal |
---|
Cybersecurity evaluation | O | O | O |
Selection of optimal protection measures | X | X | O |
Verification of protective measures | O | X | O |
Proximity to real value | X | O | O |
| Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).