Skip to main content

2018 | OriginalPaper | Buchkapitel

12. A Risk Management Approach for Highly Interconnected Networks

verfasst von : Stefan Schauer

Erschienen in: Game Theory for Security and Risk Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Critical infrastructures together with their utility networks play a crucial role in the societal and individual day-to-day life. Thus, the estimation of potential threats and security issues as well as a proper assessment of the respective risks is a core duty of utility providers. Despite the fact that utility providers operate several networks (e.g., communication, control, and utility networks), most of today’s risk management tools only focus on one of these networks. In this chpater, we will give an overview of a novel risk management process specifically designed for estimating threats and assessing risks in highly interconnected networks. Based on the internationally accepted standard for risk management, ISO 31000, our risk management process integrates various methodologies and tools supporting the different steps of the process from risk identification up to risk treatment. At the heart of this process, a novel game-theoretic approach for risk minimization and risk treatment is applied. This approach is specifically designed to take the information coming from the various tools into account and model the complex interplay between the heterogeneous networks, systems, and operators within a utility provider. It operates on qualitative and semiquantitative information as well as empirical data and uses distribution-valued payoffs to account for the unpredictable effects occurring in this highly uncertain environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
4.
Zurück zum Zitat Alshawish, A., Abid, M.A., Sui, Z., He, X., de Meer, H., Strobl, A., Opitz, A., Rass, S., Zambrano, A.: Deliverable 4.3 – Report on How to Enhance Perimeter Security Using New Surveillance Technologies. HyRiM Deliverable, Passau, Germany (2017). URL https://www.hyrim.net/project-deliverables/ Alshawish, A., Abid, M.A., Sui, Z., He, X., de Meer, H., Strobl, A., Opitz, A., Rass, S., Zambrano, A.: Deliverable 4.3 – Report on How to Enhance Perimeter Security Using New Surveillance Technologies. HyRiM Deliverable, Passau, Germany (2017). URL https://​www.​hyrim.​net/​project-deliverables/​
7.
Zurück zum Zitat Busby, J., Gouglidis, A., Rass, S., König, S.: Modelling security risk in critical utilities: the system at risk as a three player game and agent society. In: Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on, pp. 1758–1763. IEEE, Budapest, Hungary (2016) Busby, J., Gouglidis, A., Rass, S., König, S.: Modelling security risk in critical utilities: the system at risk as a three player game and agent society. In: Systems, Man, and Cybernetics (SMC), 2016 IEEE International Conference on, pp. 1758–1763. IEEE, Budapest, Hungary (2016)
12.
Zurück zum Zitat Faschang, M.: Loose Coupling Architecture for Co-Simulation of Heterogeneous Components. Ph.D. thesis, Vienna University of Technology, Vienna, Austria (2015) Faschang, M.: Loose Coupling Architecture for Co-Simulation of Heterogeneous Components. Ph.D. thesis, Vienna University of Technology, Vienna, Austria (2015)
13.
Zurück zum Zitat Faschang, M., Kupzog, F., Mosshammer, R., Einfalt, A.: Rapid control prototyping platform for networked smart grid systems. In: Proceedings IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society, pp. 8172–8176. IEEE, Vienna, Austria (2013) Faschang, M., Kupzog, F., Mosshammer, R., Einfalt, A.: Rapid control prototyping platform for networked smart grid systems. In: Proceedings IECON 2013 - 39th Annual Conference of the IEEE Industrial Electronics Society, pp. 8172–8176. IEEE, Vienna, Austria (2013)
14.
Zurück zum Zitat Findrik, M., Smith, P., Kazmi, J.H., Faschang, M., Kupzog, F.: Towards secure and resilient networked power distribution grids: Process and tool adoption. In: Smart Grid Communications (SmartGridComm), 2016 IEEE International Conference on, pp. 435 – 440. IEEE Publishing, Sidney, Australia (2016) Findrik, M., Smith, P., Kazmi, J.H., Faschang, M., Kupzog, F.: Towards secure and resilient networked power distribution grids: Process and tool adoption. In: Smart Grid Communications (SmartGridComm), 2016 IEEE International Conference on, pp. 435 – 440. IEEE Publishing, Sidney, Australia (2016)
18.
Zurück zum Zitat Gouglidis, A., Green, B., Busby, J., Rouncefield, M., Hutchison, D., Schauer, S.: Threat Awareness for Critical Infrastructures Resilience. In: Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on Resilient Networks Design and Modeling, pp. 196 – 202. IEEE Publishing, Halmstad, Sweden (2016) Gouglidis, A., Green, B., Busby, J., Rouncefield, M., Hutchison, D., Schauer, S.: Threat Awareness for Critical Infrastructures Resilience. In: Resilient Networks Design and Modeling (RNDM), 2016 8th International Workshop on Resilient Networks Design and Modeling, pp. 196 – 202. IEEE Publishing, Halmstad, Sweden (2016)
19.
Zurück zum Zitat Grimmett, G.R.: Percolation Theory. Springer, Heidelberg, Germany (1989)MATH Grimmett, G.R.: Percolation Theory. Springer, Heidelberg, Germany (1989)MATH
26.
Zurück zum Zitat International Standardization Organization: ISO 28001: Security management systems for the supply chain - Best practices for implementing supply chain security, assessments and plans - Requirements and guidance. Geneva, Switzerland (2007). English version International Standardization Organization: ISO 28001: Security management systems for the supply chain - Best practices for implementing supply chain security, assessments and plans - Requirements and guidance. Geneva, Switzerland (2007). English version
27.
Zurück zum Zitat International Standardization Organization: ISO 31000: Risk Management – Principles and Guidelines. Geneva, Switzerland (2009). English version International Standardization Organization: ISO 31000: Risk Management – Principles and Guidelines. Geneva, Switzerland (2009). English version
28.
Zurück zum Zitat International Standardization Organization: ISO/IEC 27005: Information technology - Security techniques - Information security risk management. Geneva, Switzerland (2011). English version International Standardization Organization: ISO/IEC 27005: Information technology - Security techniques - Information security risk management. Geneva, Switzerland (2011). English version
29.
Zurück zum Zitat ISACA: COBIT 5 for Risk. Rolling Meadows, USA (2013) ISACA: COBIT 5 for Risk. Rolling Meadows, USA (2013)
32.
Zurück zum Zitat König, S., Rass, S., Schauer, S.: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. In: B. Brumley, J. Röning (eds.) Secure IT Systems. 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2–4, 2016. Proceedings, pp. 67–81. Springer International Publishing, Cham (2016) König, S., Rass, S., Schauer, S.: A Stochastic Framework for Prediction of Malware Spreading in Heterogeneous Networks. In: B. Brumley, J. Röning (eds.) Secure IT Systems. 21st Nordic Conference, NordSec 2016, Oulu, Finland, November 2–4, 2016. Proceedings, pp. 67–81. Springer International Publishing, Cham (2016)
33.
Zurück zum Zitat König, S., Rass, S., Schauer, S., Beck, A.: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science and Applications(IJACSA) 7(1), 694 – 701 (2016) König, S., Rass, S., Schauer, S., Beck, A.: Risk Propagation Analysis and Visualization using Percolation Theory. International Journal of Advanced Computer Science and Applications(IJACSA) 7(1), 694 – 701 (2016)
35.
Zurück zum Zitat Maschler, M., Solan, E., Zamir, S.: Game Theory. Cambridge University Press (2013) Maschler, M., Solan, E., Zamir, S.: Game Theory. Cambridge University Press (2013)
39.
Zurück zum Zitat Rass, S.: On Game-Theoretic Risk Management (Part One) – Towards a Theory of Games with Payoffs that are Probability-Distributions. ArXiv e-prints (2015) Rass, S.: On Game-Theoretic Risk Management (Part One) – Towards a Theory of Games with Payoffs that are Probability-Distributions. ArXiv e-prints (2015)
41.
Zurück zum Zitat Rass, S., König, S., Schauer, S.: Uncertainty in Games: Using Probability-Distributions as Payoffs. In: Decision and Game Theory for Security, no. 9406 in Lecture Notes inComputer Science, pp. 346 – 357. Springer, London, UK (2015)MATH Rass, S., König, S., Schauer, S.: Uncertainty in Games: Using Probability-Distributions as Payoffs. In: Decision and Game Theory for Security, no. 9406 in Lecture Notes inComputer Science, pp. 346 – 357. Springer, London, UK (2015)MATH
47.
Zurück zum Zitat Varga, A., Hornig, R.: An Overview of the OMNeT++ Simulation Environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp. 60:1–60:10. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium (2008). URL http://dl.acm.org/citation.cfm?id=1416222.1416290 Varga, A., Hornig, R.: An Overview of the OMNeT++ Simulation Environment. In: Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems & Workshops, Simutools ’08, pp. 60:1–60:10. ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), ICST, Brussels, Belgium, Belgium (2008). URL http://​dl.​acm.​org/​citation.​cfm?​id=​1416222.​1416290
Metadaten
Titel
A Risk Management Approach for Highly Interconnected Networks
verfasst von
Stefan Schauer
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75268-6_12

Premium Partner