Skip to main content

2017 | OriginalPaper | Buchkapitel

14. Bridging the Gap from Cyber Security to Resilience

verfasst von : Paul E. Roege, Zachary A. Collier, Vladyslav Chevardin, Paul Chouinard, Marie-Valentine Florin, James H. Lambert, Kirstjen Nielsen, Maria Nogal, Branislav Todorovic

Erschienen in: Resilience and Risk

Verlag: Springer Netherlands

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter describes an evolution of practices in community and business assurance from protective programs based upon risk management to the emerging strategy of resilience. The chapter compares and contrasts these two basic approaches, identifying notable gaps where cyber security lags in the larger transformation. Recommendations address concepts, techniques, and strategies for integration of the cyber world with the physical and human worlds, and opportunities for future research.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies. ACM, p 55 Abramovici M, Bradley P (2009) Integrated circuit security: new threats and solutions. In: Proceedings of the 5th annual workshop on cyber security and information intelligence research: cyber security and information intelligence challenges and strategies. ACM, p 55
Zurück zum Zitat Alberts D (2002) Information age transformation: getting to a 21st century military. DOD Command and Control Research Program, Washington, DC Alberts D (2002) Information age transformation: getting to a 21st century military. DOD Command and Control Research Program, Washington, DC
Zurück zum Zitat Bell DE, LaPadula LJ (1973) Secure computer systems: Mathematical foundations (No MTR-2547-VOL-1). MITRE Corporation, Bedford Bell DE, LaPadula LJ (1973) Secure computer systems: Mathematical foundations (No MTR-2547-VOL-1). MITRE Corporation, Bedford
Zurück zum Zitat Bodeau D, Graubart R (2016) Cyber resilience metrics: key observations. Case No. 16–0779. The MITRE Corporation Bodeau D, Graubart R (2016) Cyber resilience metrics: key observations. Case No. 16–0779. The MITRE Corporation
Zurück zum Zitat Branlat M, Morison A, Woods DD (2011) Challenges in managing uncertainty during cyber events: lessons from the staged-world study of a large-scale adversarial cyber security exercise. Human Systems Integration Symposium, Vienna VA, 10–25 to 10–27, 2011 Branlat M, Morison A, Woods DD (2011) Challenges in managing uncertainty during cyber events: lessons from the staged-world study of a large-scale adversarial cyber security exercise. Human Systems Integration Symposium, Vienna VA, 10–25 to 10–27, 2011
Zurück zum Zitat Cimellaro GP, Reinhorn AM, Bruneauc M (2010) Framework for analytical quantification of disaster resilience. J Eng Struct 32(2010):3639–3649CrossRef Cimellaro GP, Reinhorn AM, Bruneauc M (2010) Framework for analytical quantification of disaster resilience. J Eng Struct 32(2010):3639–3649CrossRef
Zurück zum Zitat Collier ZA, Linkov I, DiMase D, Walters S, Tehranipoor M, Lambert JH (2014) Cybersecurity standards: managing risk and creating resilience. Computer 47(9):70–76CrossRef Collier ZA, Linkov I, DiMase D, Walters S, Tehranipoor M, Lambert JH (2014) Cybersecurity standards: managing risk and creating resilience. Computer 47(9):70–76CrossRef
Zurück zum Zitat Collier ZA, Panwar M, Ganin AA, Kott A, Linkov I (2016) Security metrics in industrial control systems. In: Colbert EJM, Kott A (eds) Cyber-security of SCADA and other industrial control systems. Springer, Cham, pp 167–185CrossRef Collier ZA, Panwar M, Ganin AA, Kott A, Linkov I (2016) Security metrics in industrial control systems. In: Colbert EJM, Kott A (eds) Cyber-security of SCADA and other industrial control systems. Springer, Cham, pp 167–185CrossRef
Zurück zum Zitat Dessavreand DG, Ramirez-Marquez JE (2015) Computational techniques for the approximation of total system resilience. In: Podofillini L, Sudret B, Stojadinovic B, Zio E, Kröger W (eds) Safety and reliability of complex engineered systems. CRC Press, Boca Raton, pp 145–150CrossRef Dessavreand DG, Ramirez-Marquez JE (2015) Computational techniques for the approximation of total system resilience. In: Podofillini L, Sudret B, Stojadinovic B, Zio E, Kröger W (eds) Safety and reliability of complex engineered systems. CRC Press, Boca Raton, pp 145–150CrossRef
Zurück zum Zitat DiMase D, Collier ZA, Heffner K, Linkov I (2015) Systems engineering framework for cyber physical security and resilience. Environ Syst Decis 35(2):291–300CrossRef DiMase D, Collier ZA, Heffner K, Linkov I (2015) Systems engineering framework for cyber physical security and resilience. Environ Syst Decis 35(2):291–300CrossRef
Zurück zum Zitat European Union Agency for Network and Information Security (2014) An evaluation framework for National Cyber Security Strategies. ISBN: 978-92-9204-109-0, DOI: 10.2824/3903 European Union Agency for Network and Information Security (2014) An evaluation framework for National Cyber Security Strategies. ISBN: 978-92-9204-109-0, DOI: 10.2824/3903
Zurück zum Zitat Ford R, Cavalho M, Mayron L, Bishop M (2012) Toward metrics for cyber resilience. In: 21st EICAR (European Institute for Computer Anti-Virus Research) annual conference proceedings Ford R, Cavalho M, Mayron L, Bishop M (2012) Toward metrics for cyber resilience. In: 21st EICAR (European Institute for Computer Anti-Virus Research) annual conference proceedings
Zurück zum Zitat Garcia A, Horowitz B (2007) The potential for underinvestment in internet security: implications for regulatory policy. J Regul Econ 31(1):37–51CrossRef Garcia A, Horowitz B (2007) The potential for underinvestment in internet security: implications for regulatory policy. J Regul Econ 31(1):37–51CrossRef
Zurück zum Zitat Horowitz B, Crawford J (2007) Application of collaborative risk analysis to cyber security investment decisions. Fin Ser Technol Consorti Innov J 2(1):2–5 Horowitz B, Crawford J (2007) Application of collaborative risk analysis to cyber security investment decisions. Fin Ser Technol Consorti Innov J 2(1):2–5
Zurück zum Zitat Husdal J (2010) A conceptual framework for risk and vulnerability in virtual enterprise networks. In: Ponis S (ed) Managing risk in virtual enterprise networks: implementing supply chain principle. IGI Global, Hershey, pp 1–27. doi:10.4018/978-1-61520-607-0.ch001 Husdal J (2010) A conceptual framework for risk and vulnerability in virtual enterprise networks. In: Ponis S (ed) Managing risk in virtual enterprise networks: implementing supply chain principle. IGI Global, Hershey, pp 1–27. doi:10.​4018/​978-1-61520-607-0.​ch001
Zurück zum Zitat Kaplan S, Garrick BJ (1981) On the quantitative definition of risk. Risk Anal 1(1):11–27CrossRef Kaplan S, Garrick BJ (1981) On the quantitative definition of risk. Risk Anal 1(1):11–27CrossRef
Zurück zum Zitat Karvetski CW, Lambert JH (2012) Evaluating deep uncertainties in strategic priority-setting with an application to facility energy investments. Syst Eng 15(4):483–493CrossRef Karvetski CW, Lambert JH (2012) Evaluating deep uncertainties in strategic priority-setting with an application to facility energy investments. Syst Eng 15(4):483–493CrossRef
Zurück zum Zitat Kelic A, Collier ZA, Brown C, Beyeler WE, Outkin AV, Vargas VN, Ehlen MA, Judson C, Zaidi A, Leung B, Linkov I (2013) Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks. Environ Syst Decis 33(4):544–560CrossRef Kelic A, Collier ZA, Brown C, Beyeler WE, Outkin AV, Vargas VN, Ehlen MA, Judson C, Zaidi A, Leung B, Linkov I (2013) Decision framework for evaluating the macroeconomic risks and policy impacts of cyber attacks. Environ Syst Decis 33(4):544–560CrossRef
Zurück zum Zitat Lambert JH, Keisler JM, Wheeler WE, Collier ZA, Linkov I (2013a) Multiscale approach to the security of hardware supply chains for energy systems. Environ Syst Decis 33(3):326–334CrossRef Lambert JH, Keisler JM, Wheeler WE, Collier ZA, Linkov I (2013a) Multiscale approach to the security of hardware supply chains for energy systems. Environ Syst Decis 33(3):326–334CrossRef
Zurück zum Zitat Lambert JH, Parlak AI, Zhou Q, Miller JS, Fontaine MD, Guterbock TM, Clements JL, Thekdi SA (2013b) Understanding and managing disaster evacuation on a transportation network. Accid Anal Prev 50(1):645–659CrossRef Lambert JH, Parlak AI, Zhou Q, Miller JS, Fontaine MD, Guterbock TM, Clements JL, Thekdi SA (2013b) Understanding and managing disaster evacuation on a transportation network. Accid Anal Prev 50(1):645–659CrossRef
Zurück zum Zitat Lambert, J.H., C.W. Karvetski, D.K. Spencer, B.J Sotirin, D.M. Liberi, H.H. Zaghloul, J.B. Koogler, S.L. Hunter, W.D. Goran, R.D. Ditmer, and I. Linkov 2012. Prioritizing infrastructure investments in Afghanistan with multiagency stakeholders and deep uncertainty of emergent conditions. ASCE J Infrastruct Syst 18(2): 155–166. Lambert, J.H., C.W. Karvetski, D.K. Spencer, B.J Sotirin, D.M. Liberi, H.H. Zaghloul, J.B. Koogler, S.L. Hunter, W.D. Goran, R.D. Ditmer, and I. Linkov 2012. Prioritizing infrastructure investments in Afghanistan with multiagency stakeholders and deep uncertainty of emergent conditions. ASCE J Infrastruct Syst 18(2): 155–166.
Zurück zum Zitat Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environ Syst Decis 33(4):471–476CrossRef Linkov I, Eisenberg DA, Plourde K, Seager TP, Allen J, Kott A (2013) Resilience metrics for cyber systems. Environ Syst Decis 33(4):471–476CrossRef
Zurück zum Zitat Linkov I, Bridges T, Creutzig F, Decker J, Fox-Lent C, Kröger W et al (2014) Changing the resilience paradigm. Nat Clim Chang 4(6):407–409CrossRef Linkov I, Bridges T, Creutzig F, Decker J, Fox-Lent C, Kröger W et al (2014) Changing the resilience paradigm. Nat Clim Chang 4(6):407–409CrossRef
Zurück zum Zitat Lowrance WW (1976) Of acceptable risk: science and the determination of safety. William Kaufman Inc. Lowrance WW (1976) Of acceptable risk: science and the determination of safety. William Kaufman Inc.
Zurück zum Zitat Maitra AK (2015) Offensive cyber-weapons: technical, legal, and strategic aspects. Environ Syst Decis 35(1):169–182CrossRef Maitra AK (2015) Offensive cyber-weapons: technical, legal, and strategic aspects. Environ Syst Decis 35(1):169–182CrossRef
Zurück zum Zitat McIntyre A, Becker B, Halbgewachs R (2007) Security metrics for process control systems. SAND2007-2070P. Sandia National Laboratories, U.S. Department of Energy, Albuquerque McIntyre A, Becker B, Halbgewachs R (2007) Security metrics for process control systems. SAND2007-2070P. Sandia National Laboratories, U.S. Department of Energy, Albuquerque
Zurück zum Zitat NIST (2011) Managing information security risk: organization, mission, and information system view. NIST Special Publication 800–39. National Institute of Standards and Technology, US Department of Commerce, Gaithersburg NIST (2011) Managing information security risk: organization, mission, and information system view. NIST Special Publication 800–39. National Institute of Standards and Technology, US Department of Commerce, Gaithersburg
Zurück zum Zitat NIST (2014) Framework for improving critical infrastructure cybersecurity, version 1.0. National Institute of Standards and Technology, US Department of Commerce, Gaithersburg NIST (2014) Framework for improving critical infrastructure cybersecurity, version 1.0. National Institute of Standards and Technology, US Department of Commerce, Gaithersburg
Zurück zum Zitat Parlak A, Lambert JH, Guterbock T, Clements J (2012) Population behavioral scenarios influencing radiological disaster preparedness and planning. Accid Anal Prev 48:353–362CrossRef Parlak A, Lambert JH, Guterbock T, Clements J (2012) Population behavioral scenarios influencing radiological disaster preparedness and planning. Accid Anal Prev 48:353–362CrossRef
Zurück zum Zitat Pfleeger SL, Cunningham RK (2010) Why measuring security is hard. IEEE Secur Privacy 8(4):46–54CrossRef Pfleeger SL, Cunningham RK (2010) Why measuring security is hard. IEEE Secur Privacy 8(4):46–54CrossRef
Zurück zum Zitat Pollet, J. (2002, November 19–21) Developing a solid SCADA strategy. Sicon/02 – sensors for industry conference. Houston, Texas, USA Pollet, J. (2002, November 19–21) Developing a solid SCADA strategy. Sicon/02 – sensors for industry conference. Houston, Texas, USA
Zurück zum Zitat Ponemon Institute (2016) 2016 cost of data breach study: global analysis. Ponemon Institute Research Report, Published June 2016 Ponemon Institute (2016) 2016 cost of data breach study: global analysis. Ponemon Institute Research Report, Published June 2016
Zurück zum Zitat Rinaldi S, Peerenboom J, Kelly T (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25CrossRef Rinaldi S, Peerenboom J, Kelly T (2001) Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Syst Mag 21(6):11–25CrossRef
Zurück zum Zitat Shannon CE (1948). A mathematical theory of communication. Bell Syst Tech J 27(3):379–423 Shannon CE (1948). A mathematical theory of communication. Bell Syst Tech J 27(3):379–423
Zurück zum Zitat Shakarian P, Lei H, Lindelauf R (2014) Power grid defense against malicious cascading failure. Presented at 13th international conference of autonomous agnets and multiagent systems, Paris, France, 5–9 May 2014, arXiv:1401.1086 Shakarian P, Lei H, Lindelauf R (2014) Power grid defense against malicious cascading failure. Presented at 13th international conference of autonomous agnets and multiagent systems, Paris, France, 5–9 May 2014, arXiv:1401.1086
Zurück zum Zitat Simmons GJ (1985, April). The practice of authentication. In: Workshop on the theory and application of of cryptographic techniques (pp. 261–272). Springer, Berlin/Heidelberg Simmons GJ (1985, April). The practice of authentication. In: Workshop on the theory and application of of cryptographic techniques (pp. 261–272). Springer, Berlin/Heidelberg
Zurück zum Zitat Smirnov A, Kashevnik A, Shilov N, Makklya A, Gusikhin O (2013, November) Context-aware service composition in cyber physical human system for transportation safety. In: ITS Telecommunications (ITST), 2013 13th international conference on (pp 139–144). IEEE Smirnov A, Kashevnik A, Shilov N, Makklya A, Gusikhin O (2013, November) Context-aware service composition in cyber physical human system for transportation safety. In: ITS Telecommunications (ITST), 2013 13th international conference on (pp 139–144). IEEE
Zurück zum Zitat Sridhar S, Hahn A, Govindarasu M (2012) Cyber–physical system security for the electric power grid. Proc IEEE 100(1):210–224CrossRef Sridhar S, Hahn A, Govindarasu M (2012) Cyber–physical system security for the electric power grid. Proc IEEE 100(1):210–224CrossRef
Zurück zum Zitat Teng K, Thekdi SA, Lambert JH (2012) Identification and evaluation of priorities in the business process of a risk or safety organization. Reliab Eng Syst Saf 99:74–86CrossRef Teng K, Thekdi SA, Lambert JH (2012) Identification and evaluation of priorities in the business process of a risk or safety organization. Reliab Eng Syst Saf 99:74–86CrossRef
Zurück zum Zitat Teng K, Thekdi SA, Lambert JH (2013) Risk and safety program performance evaluation and business process modeling. IEEE Transac Syst Man Cybernetics Part A 42(6):1504–1513CrossRef Teng K, Thekdi SA, Lambert JH (2013) Risk and safety program performance evaluation and business process modeling. IEEE Transac Syst Man Cybernetics Part A 42(6):1504–1513CrossRef
Zurück zum Zitat Thorisson H, Lambert JH, Cardenas JJ, Linkov I (2016) Resilience analytics for power grid capacity expansion in a developing region. To appear in Risk Analysis Thorisson H, Lambert JH, Cardenas JJ, Linkov I (2016) Resilience analytics for power grid capacity expansion in a developing region. To appear in Risk Analysis
Zurück zum Zitat Tierney K, Bruneau M (2007) Conceptualizing and measuring resilience: A key to disaster loss reduction. TR News 250:14–17 Tierney K, Bruneau M (2007) Conceptualizing and measuring resilience: A key to disaster loss reduction. TR News 250:14–17
Zurück zum Zitat Tversky A, Kahneman D (1973) Availability: a heuristic for judging frequency and probability. Cogn Psychol 5(2):207–232 Tversky A, Kahneman D (1973) Availability: a heuristic for judging frequency and probability. Cogn Psychol 5(2):207–232
Zurück zum Zitat Veitch CK, Henry JM, Richardson BT, Hart DH (2013) Microgrid cyber security reference architecture, Version 1.0. SAND2013-5472. Sandia National Laboratories, Albuquerque, New Mexico Veitch CK, Henry JM, Richardson BT, Hart DH (2013) Microgrid cyber security reference architecture, Version 1.0. SAND2013-5472. Sandia National Laboratories, Albuquerque, New Mexico
Zurück zum Zitat Woods DD (2012) Chapter 9: Resilience and the ability to anticipate. In: Pariès MJ, Wreathall MJ, Woods DD, Hollnagel E (eds) Resilience engineering in practice: a guidebook. Ashgate Publishing Ltd, Farnham Woods DD (2012) Chapter 9: Resilience and the ability to anticipate. In: Pariès MJ, Wreathall MJ, Woods DD, Hollnagel E (eds) Resilience engineering in practice: a guidebook. Ashgate Publishing Ltd, Farnham
Zurück zum Zitat Xiong G, Zhu F, Liu X, Dong X, Huang W, Chen S, Zhao K (2015) Cyber-physical-social system in intelligent transportation. IEEE/CAA J Automat Sin 2(3):320–333MathSciNetCrossRef Xiong G, Zhu F, Liu X, Dong X, Huang W, Chen S, Zhao K (2015) Cyber-physical-social system in intelligent transportation. IEEE/CAA J Automat Sin 2(3):320–333MathSciNetCrossRef
Zurück zum Zitat Young W, Leveson NG (2014) An integrated approach to safety and security based on systems theory. Commun ACM 57(2):31–35CrossRef Young W, Leveson NG (2014) An integrated approach to safety and security based on systems theory. Commun ACM 57(2):31–35CrossRef
Metadaten
Titel
Bridging the Gap from Cyber Security to Resilience
verfasst von
Paul E. Roege
Zachary A. Collier
Vladyslav Chevardin
Paul Chouinard
Marie-Valentine Florin
James H. Lambert
Kirstjen Nielsen
Maria Nogal
Branislav Todorovic
Copyright-Jahr
2017
Verlag
Springer Netherlands
DOI
https://doi.org/10.1007/978-94-024-1123-2_14