Skip to main content

2019 | OriginalPaper | Buchkapitel

Towards Integrated Quantitative Security and Safety Risk Assessment

verfasst von : Jürgen Dobaj, Christoph Schmittner, Michael Krisper, Georg Macher

Erschienen in: Computer Safety, Reliability, and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Although multiple approaches for the combination of safety and security analysis exist, there are still some major gaps to overcome before they can be used for combined risk management. This paper presents the existing gaps, based on an overview of available methods, which is followed by the proposal towards a solution to achieve coordinated risk management by applying a quantitative security risk assessment methodology. This methodology extends established safety and security risk analysis methods with an integrated model, denoting the relationship between adversary and victim, including the used capabilities and infrastructure. This model is used to estimate the resistance strength and threat capabilities, to determine attack probabilities and security risks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. Technical report, Center for Cyber Intelligence Analysis and Threat Research Hanover MD (2013) Caltagirone, S., Pendergast, A., Betz, C.: The diamond model of intrusion analysis. Technical report, Center for Cyber Intelligence Analysis and Threat Research Hanover MD (2013)
3.
Zurück zum Zitat Cox, L.A.: Some limitations of “risk = threat vulnerability consequence” for risk analysis of terrorist attacks. Risk Anal. 28(6), 1749–1761 (2008)CrossRef Cox, L.A.: Some limitations of “risk = threat vulnerability consequence” for risk analysis of terrorist attacks. Risk Anal. 28(6), 1749–1761 (2008)CrossRef
4.
Zurück zum Zitat Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)CrossRef Elmaghraby, A.S., Losavio, M.M.: Cyber security challenges in smart cities: safety, security and privacy. J. Adv. Res. 5(4), 491–497 (2014)CrossRef
5.
Zurück zum Zitat European Commission: A European strategy on Cooperative Intelligent Transport Systems, a milestone towards cooperative, connected and automated mobility. Technical report, European Commission, November 2016 European Commission: A European strategy on Cooperative Intelligent Transport Systems, a milestone towards cooperative, connected and automated mobility. Technical report, European Commission, November 2016
6.
Zurück zum Zitat Freund, J.: Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann, Oxford (2015) Freund, J.: Measuring and Managing Information Risk: A FAIR Approach. Butterworth-Heinemann, Oxford (2015)
7.
Zurück zum Zitat Hubbard, D., Evans, D.: Problems with scoring methods and ordinal scales in risk assessment. IBM J. Res. Dev. 54(3), 2 (2010)CrossRef Hubbard, D., Evans, D.: Problems with scoring methods and ordinal scales in risk assessment. IBM J. Res. Dev. 54(3), 2 (2010)CrossRef
8.
Zurück zum Zitat Hubbard, D.W., Seiersen, R.: How to Measure Anything in Cybersecurity Risk. Wiley, Hoboken (2016)CrossRef Hubbard, D.W., Seiersen, R.: How to Measure Anything in Cybersecurity Risk. Wiley, Hoboken (2016)CrossRef
9.
Zurück zum Zitat IEC: IEC 60812: Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA) (2006) IEC: IEC 60812: Analysis techniques for system reliability - Procedure for failure mode and effects analysis (FMEA) (2006)
10.
Zurück zum Zitat ISO: ISO 31000 - risk management - guidelines ISO: ISO 31000 - risk management - guidelines
11.
Zurück zum Zitat ISO: ISO 26262 Road vehicles - Functional safety (2011) ISO: ISO 26262 Road vehicles - Functional safety (2011)
12.
13.
Zurück zum Zitat ISO/IEC: ISO/IEC 15408: Information Technology Security Evaluation (2005) ISO/IEC: ISO/IEC 15408: Information Technology Security Evaluation (2005)
14.
Zurück zum Zitat Johnson, C.W.: Why we cannot (yet) ensure the cybersecurity of safety-critical systems. In: Proceedings of 24th Safety-Critical Systems Symposium, pp. 171–182 (2016) Johnson, C.W.: Why we cannot (yet) ensure the cybersecurity of safety-critical systems. In: Proceedings of 24th Safety-Critical Systems Symposium, pp. 171–182 (2016)
16.
Zurück zum Zitat Lisova, E., Sljivo, I., Causevic, A.: Safety and security co-analyses: a systematic literature review (2018) Lisova, E., Sljivo, I., Causevic, A.: Safety and security co-analyses: a systematic literature review (2018)
17.
Zurück zum Zitat Macher, G., et al.: Integration of security in the development lifecycle of dependable automotive CPS (2017) Macher, G., et al.: Integration of security in the development lifecycle of dependable automotive CPS (2017)
19.
Zurück zum Zitat Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA: a security-aware hazard and risk analysis method. In: Design, Automation and Test in Europe Conference and Exhibition (2015) Macher, G., Sporer, H., Berlach, R., Armengaud, E., Kreiner, C.: SAHARA: a security-aware hazard and risk analysis method. In: Design, Automation and Test in Europe Conference and Exhibition (2015)
20.
Zurück zum Zitat Malcolm, D.G., Roseboom, J.H., Clark, C.E., Fazar, W.: Application for a technique for research and development program evaluation (1959) Malcolm, D.G., Roseboom, J.H., Clark, C.E., Fazar, W.: Application for a technique for research and development program evaluation (1959)
24.
Zurück zum Zitat International Organization for Standardization (ISO), I.E.C.I.: Information technology – Security techniques – Information security risk management (2008) International Organization for Standardization (ISO), I.E.C.I.: Information technology – Security techniques – Information security risk management (2008)
25.
Zurück zum Zitat The Open Group: Risk Analysis (O-RA), October 2013 The Open Group: Risk Analysis (O-RA), October 2013
26.
Zurück zum Zitat The Open Group: Risk Taxonomy (O-RT) 2.0, October 2013 The Open Group: Risk Taxonomy (O-RT) 2.0, October 2013
27.
Zurück zum Zitat Xu, L.D., Xu, E.L., Li, L.: Industry 4.0: state of the art and future trends. Int. J. Prod. Res. 56(8), 2941–2962 (2018)CrossRef Xu, L.D., Xu, E.L., Li, L.: Industry 4.0: state of the art and future trends. Int. J. Prod. Res. 56(8), 2941–2962 (2018)CrossRef
Metadaten
Titel
Towards Integrated Quantitative Security and Safety Risk Assessment
verfasst von
Jürgen Dobaj
Christoph Schmittner
Michael Krisper
Georg Macher
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-26250-1_8