Analyzing security risks in critical infrastructures embedded in systems of systems: How to capture the impact of interdependencies
نویسنده
چکیده
Our economy and national well-being is highly dependent on Critical Infrastructures (CIs). Today, CIs rely heavily on ICT and are often embedded within systems of systems. This makes CIs particularly vulnerable to security threats. In this paper we address the methodological challenge of how to estimate the impact that interdependencies within a System of Systems (SoS) have on the overall security risk picture of an embedded CI. becomes possible, at least in theory, to access the ICT systems from anywhere in the world. This makes information security (International Organization for Standardization 2005) a central part of Critical Infrastructure Protection (CIP), and this is also supported by numerous examples of ICT incidents in CIs, such as (Poulsen 2003, Poulsen 2004, Lemos 2007). Informally, an SoS may be thought of as a kind of “super system” comprised of a set of interconnected systems that work together towards some common goals. One example is the system consisting of the electrical grid and its supporting systems, such as telecommunication systems. Here the common goal is to provide electrical power. It is also an example of a CI embedded within an SoS. To assess the security of a CI within an SoS may be extremely challenging. Firstly, the individual systems in an SoS may be highly dependent. Secondly, the individual systems may be under different managerial control and within different jurisdictions. For the systems that are outside our control, we often have a limited knowledge of their security risks, structure, and behavior. In general, it is much easier to model and analyze intradependencies between systems that are controlled by the same party, than interdependencies between systems in an SoS, of which many we have only restricted documentation and control. In this paper we address these challenges. In particular, how to estimate the impact that interdependencies within an SoS have on the overall security risk picture of an embedded CI. The rest of the paper is structured as follows: In Section 2 we provide definitions for different types of dependencies. In Section 3 we demonstrate our
منابع مشابه
Infrastructure Systems Interdependencies and Risk Informed Decision Making (RIDM): Impact Scenario Analysis of Infrastructure Risks Induced by Natural, Technological and Intentional Hazards
Infrastructure can be defined as physical assets that are capable of an intended service delivery, comprising of rigid assets such as buildings, roads, bridges, and facilities, as well as flexible assets such as utilities and facilities related to water, sewage, power etc. including their systems and machinery. Infrastructure systems can be viewed as a structured network of interdependent mecha...
متن کاملA Study on Factors Affecting Operational Electronic Banking Risks in Iran Banking Industry (Case Study: Kermanshah Melli Bank)
Nowadays, advances in information and communication technologies, has provided an opportunity for banks to provide their electronic services to their customers in remote areas. This technological innovation by E–banking systems has brought about many benefits to customers while it has been accompanied by a number of risks including the operational ones. This risks need to be identified and mana...
متن کاملDefinition, implementation and application of a model-based framework for analyzing interdependencies in electric power systems
Electric power systems are prominent representatives of the critical infrastructure. Existing electric power systems are composed by two cooperating infrastructures: the electric infrastructure, which is responsible for electricity generation and electricity transmission to customers; and information technology based control systems that monitor and control the physical parameters of the electr...
متن کاملA Process for the Identification of Security Risks from Critical Infrastructure Interdependencies
Traditional security risk assessment takes a broad asset-based view of organizations. The risk identification process therefore focuses on well-known threats and vulnerabilities to static and discrete assets that fall within the scope of organizational boundaries under investigation. It does not offer a methodology or framework that systematically deals with risks that arise from the complex in...
متن کاملWhy We Must Talk About Institutional Corruption to Understand Wrongdoing in the Health Sector; Comment on “We Need to Talk About Corruption in Health Systems”
While various forms of corruption are common in many health systems around the world, defining wrongdoing in terms of legality and the use of public office for private gain obstructs our understanding of its nature and intractability. To address this, I suggest, we must not only break the silence about the extent of wrongdoing in the health sector, but also talk differe...
متن کامل