According to NIST, risk identification is the “Process of finding, recognising, and describing risks” which provides the data needed for a risk assessment [
7]. Assets and users are the entities that attackers may target and need to be protected. Information is needed to understand the environment [
61] and provide a detailed architecture of the systems [
72], which may also include users. Once assets are identified, potential threats and vulnerabilities can be uncovered. These components can combine to create negative events. Threats refer to processes or activities that increase the likelihood of such events, while IoT vulnerabilities are weaknesses that could be exploited. Subsequently, existing security controls can be identified, providing information on how each mechanism can mitigate certain threats and the extent to which they can do so. Additionally, risk parameters can be identified to determine the impact and likelihood of potential threats and vulnerabilities.
4.1.1. Identification of IoT Assets
NIST [
9] defines
asset identification as being the “use of attributes and methods to uniquely identify an asset”. The identification of assets may take place as part of a context-gathering phase, which supplies the information needed to understand the environment [
61] and to provide a detailed architecture of the systems [
72]. In the case of an IoT domain, the information provided from the identification of IoT assets and users is integral to ensuring that other risk management phases capture the most accurate results.
Despite the similarities between IoT domains, devices operate in diverse ways to achieve different goals. Seeam et al., [
71] consider this concept by evaluating various IoT domains and proposing the types of assets that may exist in an environment, as well as the fundamental security goals that threats could circumvent. Meanwhile, Danielis et al., [
50] use ISO/IEC 2700 to analyse risk of IoT, using primary and supporting assets that are inputted within a dedicated worksheet with the various related attributes. Within Anisetti et al., [
46] an asset assessment phase is used to identify all assets for an organisation, with these assets holding value and non-functional properties.
Health related IoT like the Internet of Medical Things (IoMT) aim to automate healthcare related systems while also improving the level of care for patients. Nakamura and Ribeiro [
65] concentrate on assessing OCARIoT (Smart Childhood Obesity Caring Solution using IoT potential), a platform that provides an IoT-based system to coach children into adopting healthy eating and physical activity. Within the first phase of the model, the IoT domain’s context is built, collecting information about assets. As a complement, the second phase builds a data flow diagram which shows all the points that could be attacked. In the context of wearable health devices, Tseng et al., [
74] establish that assets and their value must be identified so that the accuracy of data flow diagrams can be improved, suggesting that rigorous qualitative analysis must be used to assess the value of assets. In connection, Vakhter et al., [
75] focus on assessing miniaturised wireless biomedical devices and establish a model phase that enumerates protected assets that are tangible or intangible.
Smart cities hold a huge amount of data, assets, and users, which can make risk assessment difficult, with a limited number of datasets which can be used. Kalinin et al., [
59] overcame this issue by synthetically creating asset datasets to simulate a large-scale dynamic network. The use of a neural network allows the authors to easily decide the types of assets used, tailored to be smart city specific. Alternatively, Andrade et al., [
45] focuses on critical assets, rather than trying to identify them all. These assets may have a much higher priority due to a higher damage potential which may propagate within a smart city network.
Unlike other IoT domains, smart homes carry more freedoms due to not being bound by legislation, with users utilising devices how they see fit, which can pose a significant risk to personal life. According to James [
58], one of the most critical security objectives for smart homes is to prioritise the identification of user authorisation, where only specific users should have access to resources. Ryoo et al., [
70] suggest that an asset inventory of IoT devices needs to be created, with this inventory outlining the components of a smart home environment. The creation of such inventory may be automatic or semi-automatic and the information required relates to capturing device capabilities, which can be used to derive the impact on security and privacy.
Kavallieratos and colleagues [
60] present another smart home model that identifies assets in the second phase of their framework, enabling the development of data flow diagrams. Parsons et al., [
68] utilised an adapted version of the Health and Safety Guidance (HSG48) to determine the most appropriate assets and users that may be vulnerable to risks in a smart home. In another study related to smart homes, Ali and Awad [
42] utilised the OCTAVE Allegro model, which includes a phase that collects asset information through a profile asset approach, primarily focusing on critical information assets. The authors established risk measurement criteria before this phase.
Zahra and Abdelhamid [
77] propose the risk analysis methodology EBIOS [
78] which also contains a context gathering phase, aiming to ensure that the IoT domain is identified and described. This phase collects information about assets, different actors and stakeholders, and the parameters that need to be considered in risk analysis. Echeverria et al., [
52] incorporated a phase in their approach that establishes the purpose and requirements of the IoT domain, considering other relevant conditional factors that an organisation should consider when defining the environment.
Sometimes, an organisation may need to prioritise the most critical assets. Abbass et al., [
39] propose ArchiMate. based Security Risk Assessment as a Service (ASRAaaS) which follows a “Do-Act-Check” approach starting with the creation of an inventory which contains identified critical assets using risk profiles. Christensen et al., [
49] conducted an assessment of evaluation targets, which consisted of multiple assets, and identified the components that an attacker would consider valuable. Finally, Chehida et al., [
48] used an IoT domain model to aid in finding assets, this helps to avoid overlapping labels for assets.
In their study, Ali et al., [
43] emphasise the importance of identifying assets in IoT systems due to their complex interfaces and architectural layers. The authors illustrate this point by highlighting how a seemingly simple device like a smart thermostat can comprise of several components such as firmware, personal information, and more. These components are considered as valuable assets, and their identification is crucial for ensuring their security and protection. By providing this insight, the authors shed light on the need for a comprehensive approach to IoT security that considers the different layers and components of the system. Meanwhile, Ksibi et al., [
61] focus on analysing the abnormal IoT system usage within a model that requires user’s to be identified by membership and location to devices, data which would need to be collected before the risk model could analyse risk.
Insight 1: For RQ1, assets classification needs to be dynamic, fitting various standards and prioritise valuable assets, with the ability to be updated when required. The issue with current methods is that’s specific critical assets may be overlooked, thus being forgotten in the risk management processes, with such classifications like tangible/intangible assets [
75], primary/supporting assets [
50], functional/non-functional asset properties [
46] are not IoT specific. This poses the question of how IoT assets should be broken down, for example, should a device be more than one asset? How are device capabilities factored in? As an example of non-specific IoT assets, Al et al., [
41], defines hardware as an asset type, but does not expand on how IoT hardware is classified. The main point of contention is how to ensure that sensors and actuators are assessed for risk, with the identification of these components allowing for them not to be missed. Overcoming this, Ali et al., [
43] is one of the only papers that breaks down IoT devices by components, while papers like Christensen et al., [
49] approaches the aspects of an IoT system that could be targeted by an attacker. There is no agreed upon method for IoT asset classification, which may be due to various IoT domains having different needs, with different assets that do different things and are controlled by different people. IoT asset classification needs to be clear to create an asset inventory (potentially for the first time in the case of IoT domains like smart homes.) for ease of understanding critical security objectives [
58].
4.1.2. Identification of Users
Users require protection from IoT cyber-attacks to ensure safety and to protect users from being harmed. Zahra and Abdelhamid [
77] suggest that the context state of an IoT risk framework involves not only the collection of assets, but the types of risk actors and stakeholders that could be impacted by an attack. Despite this, there is significant lack of IoT cyber risk management frameworks that prioritise users, for example, users may be expressed as another asset type [
48] rather than an individual entity. Researchers have suggested different approaches to mapping assets and users to threats.
For instance, Chehida et al., [
48] and Nakamura et al., [
65] propose that the impact of attacks on assets and users should be considered in threat analysis. In contrast, Andrade et al., [
45] highlight the importance of considering user interactions with real-world physical devices. By adopting these approaches, researchers can develop a more nuanced understanding of the complex relationship between assets, users, and threats in the context of IoT security. While users could be simply viewed as another asset, other frameworks expand on how user can be modelled within the IoT domain based on a set of attributes.
Rather than considering privileges, Ali and Awad [
42] map users to assets to reflect responsibility for that asset. In contrast, Tseng et al., [
74] use a trust level which defines the access that an application should grant to users using privileges and user roles to model access trust levels to aid in the creation of a data flow diagram. Additionally, with the second phase of Al et al., [
41], a trust model is defined for the device, comprising software, hardware, and data on which the device relies for its security.
Another approach from Ksibi et al., [
61] describes user types as the membership (insiders and outsiders) and the location of a user in connection to a device (internal or external uses). This is used with a formula that deals with the probability of abnormal usage at a storage and processing level. Finally, in our prior work, Parsons et al., [
68] classified individual users by identifying their high risk behaviours, familiarity with security, as well as perception and prevention abilities.
Insight 2: Within the surveyed papers, assets and users are often intertwined, making them integral to answer RQ1. IoT devices have more enhanced capabilities than traditional IT hardware due to sensors and actuators with the involvements of a controller (such as a smart phone) or automated actions based on environmental stimuli (like motion). The papers discussing users are significantly less than assets, with users often being seen as another asset to be protected, which may be sufficient for some IoT domains. The complex relationship between assets and users poses an additional need to know how users interact with devices, with Al et al., [
41] and Tseng et al., [
74] using trust models to define IoT security assurance. However, IoT domains like smart homes where there is little regulation, this approach neglects human interaction and usage of the system and how this may affect risk. For example, within Parsons et al., [
68] the lack or abundance of cyber best IoT practices (such as default passwords) can reduce or increase the risk level of a smart home. In turn, without understanding how users interact with devices, the link between a user and the vulnerabilities they may cause could be missed, thus critical risks could be overlooked.
4.1.3. Identification of Threats
Threats are circumstances with the potential to adversely impact organisational operations assets, or individuals using attacks that allow for “unauthorised access, destruction, disclosure, modification of information, and/or denial of service” [
79] by exploiting vulnerabilities. IoT threats are the events that have the potential to adversely impact on IoT assets and users [
80]. To identify threats in IoT systems, it is necessary to discover their sources and assess their potential impact. IoT risk management frameworks offer several ways to achieve this, including the use of established threat modelling methods, development of new threat models, and analysis of attack use cases.
Threat-based risk assessment for IoT involves evaluating potential risks associated with IoT devices by analysing and modelling potential threat scenarios. This approach is an essential part of the overall IoT risk assessment process, helping to identify and prioritise potential risks. As noted in [
80], this approach involves modelling, developing, and analysing potential threats to determine the overall risk posed by an IoT device or network.
There are several effective threat modelling methods available, such as STRIDE [
81] and LINDDUN [
82]. Among these, Microsoft’s STRIDE threat model is the most widely used in IoT cyber risk management frameworks to identify and quantify potential threats. It divides threats into six categories, namely spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege [
81]. This model has been extensively referenced in recent research on IoT security, including studies on threat analysis [
50,
60,
70,
71], threat vectors [
43], and attack surfaces [
45]. Therefore, utilising the STRIDE threat model can provide a solid foundation for comprehensive IoT security risk assessment and management.
The issue with using STRIDE is that while it is good for security risks, privacy risks are often not exhaustive making it insufficient in places where privacy is of the utmost importance. LINDDUN targets the modelling privacy related threats, these being linkability, identifiability, non-repudiation, detectability, disclosure of information, unawareness, and non-compliance [
82], while DREAD (Damage, Reproducibility, Exploitability, Affected Users, Discoverability) [
83] allows for the comparing and prioritisation of threats using a rating. Since IoT poses a larger threat on privacy alongside containing attacks on sensors and actuation, modifications may be needed to capture all threats that could be high risk. To overcome this, Shivraj et al., [
72] simulate their proposed framework using STRIDE, DREAD, and LINDDUN, using LINDDUN to focus on privacy risks. Tseng et al., [
74] use the STRIDE and DREAD model to find the threats and the attack potential of wearable Internet of Medical Things devices, while Andrade et al., [
45] use both models in the context of smart cities. functions (e.g., the abuse of privileges).
There are various methodologies available for identifying and mitigating cyber threats, and one such approach is the OCTAVE Allegro methodology, as discussed by Ali and Awad in their study [
42]. This methodology includes a dedicated phase for identifying potential threats, which involves identifying areas of concern and creating threat scenarios to better understand the various cyber threats that could target smart home data. Meanwhile, Echeverria et al., [
52] perform threat modelling using analysis from the OWASP IoT Top 10 project as way to identify the threats.
Pacheco et al., [
67] use anomaly behaviour analysis to identify behaviours that deviate from normal operations, with anomaly behaviour being a threat to IoT systems, with this behaviour being characterised by variables such as hardware configuration and system memory. Abbass et al., [
39] propose ASRAaaS (an ArchiMate based Security Risk Assessment as a service model) which uses the ArchiMate modelling language. The model analyses the potential threats for IoT systems using vulnerabilities which are assessed within attack scenarios.
Zahra and Abdelhamid [
77] use EBIOS which includes assessing the context, feared events, and threat scenarios used to study risks. The authors use an example of a IoT threat scenario based on an attacker taking control of IoT processes. Chehida et al., [
48] also use EBIOS to formulate a threat list which are classified into eight main categories, for example, threats that cause physical damage (e.g., fires and damage to hardware), unauthorised actions (e.g., the corruption of data), and the compromise of functions (e.g., the abuse of privileges).
Threat classifications can be used to categorise threats in simple or complex ways, with authors defining classifications based on several different factors. For example, threats may be categorised based on the types of impact that cause, such as the impact on confidentiality, integrity, and availability [
59]. Threat classification can be based on attacker characteristics and the skills required to perform an attack [
44,
75], and the types of attackers that would target IoT systems [
44].
Wangyal et al., [
76] consider high level risk factors that describe how threats may manifest. These factors are categorised in
cyber,
physical, and
psychological. Mohsin et al., [
63,
64] classify IoT threats by core IoT components.
Context threats are non-malicious imperfections associated with processing communicating information;
trigger threats are based on decision making, with triggers for actuation being blocked or incomplete where a decision cannot be made; and
actuation threats are based on the anomalous behaviours that can cause denied or delayed actuation.
Attack surfaces can be used to define the threat landscape for IoT systems in its entirety. Lally and Sgandurra [
62] utilise multiple threat models that relate to an attacker’s access types, for example physical, remote or application access. Rizvi et al., [
69] define a threat environment for IoT network to uncover attacks on smart pacemakers, IP cameras, and Radio Frequency Identification devices using vulnerabilities which could be exploited on these device types. Additionally, James [
57] define two main types of attack surfaces based on attacks associated with them local networks and public networks and users and devices interact. Nakamura and Ribeiro [
65] use threat mapping to display all possible security issues that may arise and how these may have been caused, for example a threat being accidental, malicious, or natural. Pacheco et al., [
66] define threat models for each architectural layer of IoT with each threat model defining the attack surface and the associated entry points.
Finally, rather than providing a method that could be used to identity threats, papers may focus more on specific use cases and attack types. In Arfaoui et al., [
47] authors formulate a threat model based on IoT wireless body area networks where attacks (impersonation attacks, false data injection, false log-in attempts, sniffing, and eavesdropping ) can be dynamic. Ksibi et al., [
61] assess tampering attacks targeting a smart insulin pump and Christensen et al., [
49] uncover threats towards distributed energy resources. In contrast, Parsons et al., [
68] use tactics from Mitre’s IoT ATT&CK matrix to formulate an example attack scenario, where an attacker acquires personal credentials to gain unauthorised access to a smart camera account, once access has been gained, the attacker uses the smart camera’s functionalities to phish home residents into paying a ransom. As part of their security assessment of knowledge within smart homes, Aiken et al., [
40], focus on common attacks that smart home residents need to know, questioning users about social engineering, spoofing, ransomware, denial of service, and man in the middle attacks. Finally, James [
58] and Anisetti et al., [
46] spotlight the identification of attacks towards IoT sensors and actuators.
Insight 3: Another factor of RQ1 relates to identifying potential threats that exist for an IoT domain in an accurate fashion. The most common way to model IoT threats is using STRIDE [
43,
45,
50,
60,
70,
71]. While effective, the use of well-known threat models may not allow for all threats to be uncovered, for example STRIDE requires other models like DREAD and LINDDUN to uncover privacy risks within Shivraj et al., [
72]. STRIDE and other well-known models are not explicitly for IoT, which may be an issue when finding an exhaustive set of threats within an IoT domain. Uncovering threats requires a good understanding of assets, users, and the needs they possess, where it is important to ensure all potential threats towards assets and users are accounted for, with critical threats not being forgotten.
4.1.4. Identification of Vulnerabilities
Vulnerabilities are the weaknesses in “information systems, system security procedures, internal controls, or implementation” that could be exploited by a threat source [
17]. Within the IoT cyber risk management models, the identification of vulnerabilities is simply referred to into how vulnerabilities are collected and the data needed to aid risk assessment [
39,
42,
44,
45,
46,
48,
53,
56,
61,
66,
67,
71,
75,
77] with more emphasis on using vulnerabilities for threat modelling. For example, the use of a threat modelling phase which requires exploitable vulnerabilities and how these link to threat actors [
41]. In other papers, vulnerability identification is undertaken by using various knowledge bases and methodologies that may also be used for threats, such as OWASP [
52,
65], NVD [
51], CRAMM (CCTA Risk Analysis and Management Method) [
50], MITRE’s CVE list [
54,
55], and STRIDE [
43,
60,
72].
Risk-related attributes can be used to indicate vulnerabilities [
70] as well as contextual information gathered by monitoring an IoT system [
47] that could make it easier to find weaknesses. Lally and Sgandurra [
62] link vulnerabilities to IoT security requirements, tools for testing vulnerabilities, and threat models to formulate an attack surface. Not only this, but vulnerabilities can be linked to attributes like external entities, trust boundaries, data flows, and entry points [
74]. Part of this information may relate to prioritisation of vulnerabilities due to their criticality based on the potential impact [
69] or an increased likelihood of being targeted [
57,
63]. The commonality of vulnerabilities may also be prioritised due to the potential ease of exploit [
49].
Vulnerabilities may be simplified into classifications based on risk-related attributes. For example, George and Thampi [
54,
55] categorise vulnerabilities into software weaknesses and insecure configurations for devices and networks, while Garcia et al., [
53] propose eight vulnerability types for general IoT domains. Within James [
58], vulnerabilities are associated within a single or multi-state state attack, where more complex attacks use a vulnerability to have multiple outcomes. In contrast, Rizvi et al., [
69] uncover vulnerabilities for several devices, these being smart pacemakers, IP cameras, and Radio Frequency Identification devices (RFID).
Wangyal et al., [
76] propose a classification approach for identifying and assessing cyber risks in IoT systems. The approach categorises threats and vulnerabilities into different risk categories based on attacker factors, such as cyber, physical, and psychological. In addition, the approach also considers the specific IoT components that an attacker might target, such as software or hardware, and breaks down vulnerabilities based on these targets. An attacker’s capabilities may also play a part in identifying vulnerabilities [
64].
One subset of IoT vulnerabilities relates to human vulnerability/human weaknesses in relation to IoT systems. Human vulnerabilities express the ways that humans can be vulnerable to IoT attacks, which is increasingly more concerning with the large amount of personal information and increased attack surface brought by IoT technology [
84]. While an IoT device’s software can be updated and patched, humans are not as simple. Humans may be susceptible to psychological attacks or simply not be aware that their actions could lead to an attack. For example, if a user were to fall victim to social engineering, the reason may be a lack of training and awareness of what social engineering is and how it can compromise a system. This notable increase is due to there being more mediums for social engineering than before [
85], with IoT devices carrying more capabilities than traditional IT.
Risky user actions can pose as IoT weaknesses, where users with a higher risk appetite can increase the likelihood of an attack happening due to the lack of cyber hygiene. Cyber hygiene refers to the regular good practices and mitigation methods that help maintain security, with lacking cyber hygiene hampering an IoT domain’s ability to respond to attacks [
86,
87]. Examples of high risk actions include not changing passwords/usernames [
73], the use of unknown public networks [
58], and not receiving training when it comes to IoT security [
76]. The lack of security knowledge and awareness [
40,
61,
68] refers to potential lack of security knowledge and awareness of a user about IoT security. Users may become vulnerable to cyber threats due to a lack of training, which can prevent them from understanding how to prevent or respond to such threats. This vulnerability also increases the risk of falling prey to social engineering attacks [
42,
44,
68], such as phishing, which exploit personal factors to gain access to sensitive information. For instance, a user’s emotional state and lack of knowledge regarding social engineering attacks can make them more susceptible to such attacks.
Another common high risk action is the misconfiguration of IoT systems [
44,
55,
57,
67], where users configure an IoT system incorrectly or in a fashion that is not secure, for example not setting up two-factor authentication. Finally, the potential misuse of systems [
42,
49,
57,
67], which may be intentional with users using a system to perform an attack (e.g., spying or eavesdropping) or unintentional where users choose to ignore some security mechanisms, e.g., bypassing security processes when using their devices.
Insight 4: The main objective of uncovering IoT vulnerabilities is to clearly define exploitable weaknesses that may become an IoT threat event and dealing with these. Within RQ1, we stated that IoT cyber risk management frameworks need to extend existing threats and vulnerabilities to factor in specific IoT elements. A common theme within the surveyed papers is the consideration of human vulnerabilities due to a lack of cyber hygiene. The main benefit of identifying human vulnerabilities is the understanding of human to asset weaknesses that could affect security, something that is especially important in IoT domains with little to no regulations. Discovering the types of high risk user actions puts focus on basic IoT practises and easy fixes that can reduced risk, for example encouraging the use of different passwords/usernames from other accounts [
73]. Cyber IoT vulnerabilities can be gathered from IoT knowledge bases, with OWASP, NVD, and MITRE’s CVE list being some of the most common. However, these bases are not always applicable to all IoT domains, works like George and Thampi [
54,
55] and Garcia et al., [
53] use proposed classifications to overcome this. The issue is that unlike traditional IT systems, IoT vulnerabilities (and by extension threats) need to consider non-traditional weaknesses, for example sensor-based attacks and insecure sensor hardware.
4.1.5. Identification of Controls
Security controls are “management, operational, and technical controls” [
88] that are used to protect assets and users in different ways. A limited number of papers consider the identification of security controls to facilitate IoT risk assessment. In the context of smart homes, Parsons et al., [
68] consider the efficiency of safeguard measures that already exist within a smart home, assessing the quality of awareness-based and practical defences in addition to how these can influence the IoT risk score.
Within the SKIP (Self-assessment, Knowledge, Infrastructure, and Practices) survey framework from Aiken et al., [
40] knowledge-based questions consider IoT-specific cyber security areas, collecting information about a smart home’s infrastructure and practices. Details about IoT controls are collected here, examining the existing security systems in place, and establishing the network within the home. On the other side, practices centred questions relate to the self-reporting of best security practices and the extent implemented.
In the context of security, readiness refers to how prepared users are to identify, prevent, and respond to cyber-attacks. Within Alsubaei et al., [
44], readiness is used to understand the ease of an IoT attack based on the extent that an IoT domain is prepared to detect, report, and respond when an attack occurs. Expanding this, Ksibi et al., [
61] also represent the readiness of a device to detect and react, considering IoT security functions, like encryption and intrusion prevention mechanisms, embedded within the device or controller (like smart phones). These authors also use the lack of security knowledge of the users, which reflects an increase probability of successful attacks. In addition, the authors address the cyber risks at the network level, storage, and processing level, which both incorporate control-based risk factors. Since IoT devices are limited in security capabilities, device readiness may be weaker than expected, with readiness relying on uses to carry IoT cybersecurity knowledge and training.
Insight 5: Another factor of RQ1 is to identify pre-existing controls that reduce risk and the effectiveness on doing so. Surveyed papers involving control identification are limited, which is an issue for IoT domains that don’t have clearly defined controls. In turn, controls that are already reduce risk need to be factored into the risk assessment phase to ensure that risk results are accurate. Overcoming this, the readiness of an IoT domain could be studied by assessing the ability to detect and react to threats from an asset and user perspective much like within Ksibi et al., [
61] and Alsubaei et al., [
44].
4.1.6. Identification of Impact
Simply put, impact is the “consequential magnitude of harm” from an attack [
17]. Users and assets can be impacted by attacks in different ways. Providing specific details about the potential types of impact can help to ensure that a risk model accurately predicts the number and severity of potential losses. The CIA triad, which includes confidentiality, integrity, and availability, has been widely adopted as a suitable model for traditional IT systems and is integral to ensuring information security.
Regarding cyber risk, papers measure the impact of a threat event as the level or amount of CIA (confidentiality, integrity, and availability) loss [
44,
46,
48,
50,
51,
52,
53,
68,
69]. For IoT systems, it is crucial to consider the impact on network performance and how security controls may affect network functionality, given the trade-off between security level and impact on network performance [
47]. One significant difference between IoT and traditional systems is the extensive use of automation, which poses new threats that may impact the cyber-physical operation of devices. Therefore, cybersecurity measures should prioritise privacy, trust, and accountability to mitigate the risks of cyber-physical impacts that can be both cyber and physical-based.
The concept of cyber-physical impacts involves understanding the potential physical impacts that users may experience because of a cyber-attack, which can lead to real-world consequences. For the use of IoT within organisations, 10 papers consider impact factors that affect organisational operations [
42,
44,
45,
53,
61,
66,
68,
71,
72,
77]. First, three of the frameworks refer to “business impact” to describe the cumulative impact on a business, with factors that could vary depending on the business’s practices [
53,
71,
72].
One specific type of impact on a business is the decline in reputation for an IoT domain, company/provider [
66], with attacks causing negative press. In turn, a loss of reputation could also mean the reduced value of a company/provider’s worth [
42,
61], with Alsubaei et al., [
44] defining that the brand value loss is any tangible or intangible losses caused by an attack which can affect an organisation’s integrity (reputation), which then leads to a loss of a brand’s worth [
44]. In contrast, attacks may cause operational impacts [
45] meaning that a system no longer functions in the required way, which could then negatively impact enterprise/vocational activities [
68,
77].
The direct impact of an attack on users contains several factors that affect day-to-day lives. However, the most extreme relates to human autonomy. The impact to life refers to the user’s health being put at risk (especially in the case of IoMT environments) as an attack could be life-threatening, [
61,
77] which puts a user in physical danger [
44], makes them unsafe [
66,
67,
68], or leads to loss of life [
65,
75]. In a more psychological angle, one paper targeted emotional impact on individuals [
68]. This explores the emotions, attitudes and behavioural changes that are seen within the user once an attack has occurred with these feelings being dependent on how serious an attack is and the personality of the individual.
The impact of a cyber-attack on a user’s well-being can affect how they use other devices and their level of trust in those devices. In turn, attacks may lead to losses of important services, e.g., taking away essential services (such as water and power) [
45]. This is reflected within Pacheco et al., [
66] where there is a potential loss or wasting of energy which costs an individual or organisation extra money to takes away invaluable resources needed to power a city. Other impact types relating to the loss of time [
67], resilience, security, and reliability [
65] of IoT services, can be considered with typing being dependent on an IoT domain’s needs. One of the most common IoT impacts towards both individuals and organisations is financial loss due to a successful attack [
42,
44,
54,
61,
66,
68]. When an IoT system is compromised, both individuals and organisations will need to recover and control the ongoing damage requiring a significant budget [
44].
Meanwhile, another notable impact type is the loss of privacy that could be inflicted on users [
42,
44,
65,
68]. Researchers may consider the direct invasion of personal privacy which leads to the loss or disclosure of personal information [
42,
44,
50,
61,
69] and physical privacy because of an attack. This loss of privacy could also propagate to individuals and organisations suffering a loss of control over a system [
42,
67], which results in unauthorised access and unauthorised execution of device operations [
42]. This may occur when an attacker hijacks a system and takes full or partial control of a system, leaving users unable to use a device correctly and decreasing the amount of control they have over a system. While an attacker could inhibit functions of a system, an attacker could use their enhanced control to conduct other attacks, such as spying and social engineering.
Insight 6: As discussed to within RQ1, determining the value of impact and the types of impact that assets and user may suffer is an integral component of IoT risk. Impact needs to be estimated and well defined to ensure meaningful results when used within risk assessment. Different types of IoT impact depend on the priorities of the IoT domain and its context, for example the functionality of devices. While CIA is important cyber impact for IoT, it does not encompass the physical, real-world damages they could occur. Overcoming this requires frameworks to focus on the domestic life and business impact depending on IoT setting. On one hand, impacts like privacy and monetary losses correlate to well-known traditional IT consequences, while other IoT impacts, such as the loss of essential services [
45] also need to be considered.
4.1.7. Identification of Likelihood
In risk management, likelihood simply refers to the “chance of something happening” [
7]. Likelihood can be represented in a qualitative, quantitative, or semi-qualitative way with IoT cyber risk management frameworks commonly using numerical scales, [
46,
47,
50,
51,
54,
55,
59] and quantitative scales [
65,
76,
77].
In IoT cyber risk management literature, the most used likelihood parameter is the probability of an attack occurring [
41,
58,
64] to predict the change of an attack happening, given the configuration of a device, different attack capabilities can be used, which affects the likelihood of exploitation. In cybersecurity literature, the most used likelihood parameter is the probability of a cyber-attack occurring [
41,
58,
64]. This probability can be used to predict the likelihood of an attack happening, given the specific configuration of a device.
Andrade et al., [
45] utilise the likelihood of an IoT vulnerability being used to trigger a successful attack while also monitoring maintained behaviour over time, considering the probability a node would be violated again based on prior behaviour. Echeverria et al., [
52] use the OWASP IoT Top 10 to predict the probability of an IoT threat occurring while Shivraj et al., [
72] present the likelihood of attacks on each specific IoT network node.
Rather than estimating the probability of an attack occurring, Tseng et al., [
74] focuses on probability of an IoT vulnerability causing damage due to threat exploitation. Meanwhile, Arfaoui et al., [
47] consider the frequency of being IoT system being targeted to better understand the number of times an attack may occur, and Kavallieratos et al., [
60] consider the probability that a vulnerable IoT node can be infected, recover, and become vulnerable again.
Several factors can influence the probability of an IoT attack occurring. In some cases, researchers target IoT attributes that would allow an attacker to conduct an attack. Christensen et al., [
49] uses a methodology which assess the skills, physical accessibility, logical accessibility, the attack vector, and vulnerabilities that an IoT attacker would need to uncover the likelihood of potential threats. Vakhter et al., [
75] define the probability of an attack based on the IoT attacker’s expertise, equipment, physical proximity to a system, device assess time, and IoT device information.
Ksibi et al., [
61], Alsubaei et al., [
44] and Garcia et al., [
53] assess attacker capabilities (ease of attack) and motivation as well as the readiness of a healthcare provider to defend against attacks. Within Alsubaei et al., [
44], readiness is represented user’s lack of training and knowledge as well as the degree to which a healthcare provider is prepared to ”detect, report, and respond“ to an attack. In turn, Parsons et al., [
68] consider the risk appetite of users, referring to how high risk behaviours can affect the likelihood of an attack happening and gauging whether users can effectively prevent and respond to attacks.
Insight 7: In line with RQ1, the probabilities surrounding threat events need to be identified. IoT likelihood needs to also need clearly defined, for example the probability of an attack occurring [
41,
58,
64] or the frequency of an IoT system being targeted [
47]. Predicting attacker attributes attached allows for a better understanding of how easy an attack may be. with attributes such as accessibility, skills, and equipment being common themes with surveyed papers. Overall, an IoT likelihood scale needs to be suitable for the assessed environment based on the types of attacks that can be faced, this also means identifying the factors which can affect the likelihood.