Skip to main content
. 2022 Sep 29:1–21. Online ahead of print. doi: 10.1007/s11036-022-02042-1

Table 1.

SWOT analysis of related works

SWOT Strengths Weaknesses Opportunities Threats (Risks)
Proposal
OCTAVE

Generic; investigates recovery impact areas

Simplicity; based on a questionnaire

Qualitative; no risk quantification Applicability; applicable to small companies with limited resources Complexity; difficult to understand
TARA Predictive framework Qualitative; no risk quantification Complimentary; may be combined with other approaches Non-exhaustive; targeting only most critical exposures
CVSS Numerical; translation of experts opinions to vulnerability severity scores Scoring; only 3 color-coded levels Scalability; may increase the number of its color-coding system Truthfulness; relies on a simple mathematical formalism
Exostar Contextual; supply chain risk assessment Completeness; ignore standalone risk assessment Complimentary; may be combined with other approaches Correctness; depends on a questionnaire that may lead to incorrect results
CMMI Contextual; enterprise risk and risk in product development lifecycle Objectivity; detection without correction guidance

Complimentary; complimenting Exostar

Updates; related to ISO 9001

Completeness; difficulty to correct identified weaknesses
ISO Standardization; covers risk assessment and risk management Compliance; consensus may not be reached or may be non- compliant

Extension; cyber risk

assessment

Fairness/Completeness; depends on

voluntary compliance and consensus

NIST

Standardization;

Extensively; large size and extensive scope

Automation; lack of automation tools and support Tool supporting; Complexity; documenting / updates are time-consuming
FAIR Quantitative; impact assessment that recommends acceptable levels of exposure Cost; no free tool support Standardization; without voluntary compliance and consensus Usefulness; promotes a commercial software
RiskLens Quantitative; quantitative assessment tool promoted by FAIR

Validation; black box

to be trusted without understanding its

assessment process

Proof; peer-reviewed process

Confidence; no

peer-review validation

CyVaR Quantitative; quantitative assessment tool promoted by FAIR Standardization; standard deviation Extension; different cyber risk assessment Complexity; difficult to understand
(Radanliev et al. 2018-a) [43] Quantitative; economic impact assessment of IoT cyber risk

Construction; derived CyVaR and MicroMort weaknesses

Automation; no tool support

Standardization;

Complexity;

Proof;

(Nurse et al. 2017) [44] Analysis; discuss the application of existent approaches in IoT context Completeness; Guidelines Comprehensive study; -
(Radanliev et al. 2018-b) [45] Guidelines; recommendations for IoT cyber risk assessment and understanding its economic impact

Construction; derived CyVaR and MicroMort weaknesses

Automation; no tools and support;

Modeling; Implementation;

Complexity;

Proof;

(Malik & Singh 2019) [46] Contextual; vulnerabilities identification and mitigation in IoT context Basic; based on a smart software vendor

Generalization;

Extension; enhanced vulnerability database

Limited; basic lists of common vulnerabilities
(Akinrolabu et al. 2019) [48] Contextual; cloud supply chain cyber risk assessment

Correlation-free;

End-to-end risk;

Extension; different cyber risk assessment

Complexity;

Proof;

(Jaidi & Labbene 2015) [62]

Dynamism; dynamic assessment

Mixed; quantitative and qualitative assessment

Correlation-free;

Contextual; database security policies

Standardization -
(Jaidi et al. 2018) [63]

Dynamism; dynamic assessment

Mixed; quantitative and qualitative assessment

Correlation-free;

End-to-end risk;

Standardization -
(Cao et al. 2020) [66] Fine-grained; use of topology attributes

Correlation-free;

End-to-end risk;

Standardization Proof; to be validate in future works