Local Structures for Global Security Ferenc Friedler University of Pannonia, Veszprém, Hungary September 17-18, 2012 Duna Palota, Budapest.

Slides:



Advertisements
Similar presentations
17 th UPDEA CONGRESS IMPROVEMENT IN THE MANAGEMENT OF ELECTRICAL INFRASTRUCTURES FOR A BETTER PERFORMANCE OF AFRICAN POWER UTILITIES By Mr. Cheikh KA (SENELEC,
Advertisements

Adrian Cook, Group Head of Procurement
Online Scheduling with Known Arrival Times Nicholas G Hall (Ohio State University) Marc E Posner (Ohio State University) Chris N Potts (University of Southampton)
Prof. Seppo Virtanen TUT Dr. Seppo Virtanen, Professor, Faculty of Engineering Sciences Research and teaching interests: Reliability Engineering, Maintenance.
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.
ABB LCC ECS - 1 © 2004  Industrial IT Power Management System Scope & Value Proposition Lead Competence Center Electrical Control Systems.
INDUSTRIAL & SYSTEMS ENGINEERING
1 Introduction to System Engineering G. Nacouzi ME 155B.
Overview of Software Requirements
Title slide PIPELINE QRA SEMINAR. PIPELINE RISK ASSESSMENT INTRODUCTION TO GENERAL RISK MANAGEMENT 2.
System Engineering Instructor: Dr. Jerry Gao. System Engineering Jerry Gao, Ph.D. Jan System Engineering Hierarchy - System Modeling - Information.
Dynamic Islanding of Critical Infrastructures, a Suitable Strategy to Survive and Mitigate Critical Events Joint Infrastructure Interdependencies Research.
Introduction to Computer Technology
Romaric GUILLERM Hamid DEMMOU LAAS-CNRS Nabil SADOU SUPELEC/IETR ESM'2009, October 26-28, 2009, Holiday Inn Leicester, Leicester, United Kingdom.
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Engineering or Mechanical Engineering?
The Future of Waste Management “Matrix Reloaded” Antonis Mavropoulos CEO D-Waste
CHESSS CEN Horizontal European Service Standardization Strategy Module 3: “Safety in the Delivery of Services” prepared by Axel Mangelsdorf Berlin University.
E.ON on the Romanian Energy Market ZF Power Summit Bucharest, February 27, 2013 Frank Hajdinjak CEO E.ON România.
CS527: (Advanced) Topics in Software Engineering Overview of Software Quality Assurance Tao Xie ©D. Marinov, T. Xie.
Outline  Company Profile  Services Provided  Assets  System Schema  Risk Categories  Technical Risks and Mitigation  Summary.
Costs of Ancillary Services & Congestion Management Fedor Opadchiy Deputy Chairman of the Board.
BIS310: Structured Analysis and Design Introduction and Systems Planning Week 1.
1COM6030 Systems Analysis and Design © University of Sheffield 2005 COM 6030 Software Analysis and Design Lecture 2- Software Process Models and Project.
Management Information Systems
Assurance Case Approach TECNALIA Inspiring Business Novara November, 2013 TRIAL WS.
Process Flowsheet Generation & Design Through a Group Contribution Approach Lo ï c d ’ Anterroches CAPEC Friday Morning Seminar, Spring 2005.
Industrial Engineering Roles In Industry
1 Information System Security Assurance Architecture A Proposed IEEE Standard for Managing Enterprise Risk February 7, 2005 Dr. Ron Ross Computer Security.
A Framework for Distributed Model Predictive Control
Enav.it Channelling Finance and Innovation to Industry Steps towards the Air Traffic Management system modernisation.
Introduction A GENERAL MODEL OF SYSTEM OPTIMIZATION.
Thoughts on the National Research and Development Center for Cyber Defense Ferenc FRIEDLER University of Pannonia Veszprém, Hungary 3rd Information Security.
Highway Risk Mitigation through Systems Engineering.
Leader-Follower Framework For Control of Energy Services Ali Keyhani Professor of Electrical and Computer Engineering The Ohio State University
Energy Efficiency and Emission Management Edwin van den Maagdenberg Vice President Technology and Operations Honeywell Process Solutions.
Coevolution Chapter 6, Essentials of Metaheuristics, 2013 Spring, 2014 Metaheuristics Byung-Hyun Ha R2R3.
Historical Aspects Origin of software engineering –NATO study group coined the term in 1967 Software crisis –Low quality, schedule delay, and cost overrun.
Advanced Controls and Sensors David G. Hansen. Advanced Controls and Sensors Planning Process.
Optimal Fueling Strategies for Locomotive Fleets in Railroad Networks Seyed Mohammad Nourbakhsh Yanfeng Ouyang 1 William W. Hay Railroad Engineering Seminar.
1 EE29B Feisal Mohammed EE29B: Introduction to Software Engineering Feisal Mohammed Ph: x3156.
ENERGY FOR THE 21 ST CENTURY the Potential for Nuclear Power Luis Echávarri Director-General, OECD Nuclear Energy Agency IAEA Scientific Forum at the General.
Hydrogen Incident and Accident Database
TechCon Food systems history… Agriculture has a 10,000 year history Farmers are estimated to be 38 to 45% of the global work force In the developing.
2 nd G2G Technical Seminar – May 2013 FORECASTS ON RESEARCH IN ENGINEERING DESIGN THEORY, TOOLS AND METHODOLOGY AND ITS IMPACT ON PRODUCT DESIGN AND ENGINEERING.
The global energy landscape and its impact on Bangladesh Dr. Boris Gehring TÜV SÜD Slide 1 13/10/15‘Safe Future Now’ Summit on Power and Energy in Bangladesh.
1 Dilemmas in energy consumption, international trade and employment: Analysing the impact of embodied energy in traded goods on employment China University.
Chap 4. Project Management - Organising, planning and scheduling
ASPEC Damaging Energies New Staff Induction What is this course about? This course is designed to talk through the major damaging energies on site. It.
Name Of The College & Dept
Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution Structured programming Product SW.
Software Engineering, COMP201 Slide 1 Software Requirements BY M D ACHARYA Dept of Computer Science.
Highway Risk Mitigation through Systems Engineering.
Recoverable Service Parts Inventory Problems -Ibrahim Mohammed IE 2079.
Evaluating GIS for Disaster Management Bruce Kinner GEOG 596A.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Improving performance, reducing risk Dr Apostolos Noulis, Lead Assessor, Business Development Mgr Thessaloniki, 02 June 2014 ISO Energy Management.
9 June, 2016 Energy policy in Germany – Towards a policy for sustainable and independent energy Eszter Pászti - Márkus Science and Technology Attachée.
University education Center affiliated to the University of Barcelona.
LEADFORMANCE & BRIDGE Software publisher Objectives Strategy: expert Commercial success Advanced Store locator Connection on – offline Integrated in a.
Integrate human considerations into Air Transportation System description Camille RAYMOND Our work aims to contribute to one of the most challenging.
VILNIUS SCHOOL OF TECHNOLOGIES, BUSINESS AND AGRICULTURE
Pedro Emanuel Botelho Espadinha da Cruz
Software Risk Management
The Systems Engineering Context
Location-dependent Synthesis of Biorefinery Networks
Risk-informed Decision Making under Incomplete Information
Review and comparison of the modeling approaches and risk analysis methods for complex ship system. Author: Sunil Basnet.
Presentation transcript:

Local Structures for Global Security Ferenc Friedler University of Pannonia, Veszprém, Hungary September 17-18, 2012 Duna Palota, Budapest

Outline Introduction Recent disasters and potential risks Definitions General goals Sources of risks Security and PSE Contributions Concluding remarks

Preliminary Comment Even a cultural activity can generate global disaster.

Introduction Security is a global issue Global solution is not available Highly interdisciplinary, enormous literature Process systems engineering (PSE) Structure decomposition Security from engineering perspective Cooperation between experts of specific areas „Think globally, act locally”

Recent disasters  Breakdown of Internet in Hungary (April 30, 2012)  77 million user’s data stolen from Sony PlayStation Network (2011)  Fukushima nuclear power station catastrophe (2011)  Pakistan knocked YouTube offline for two hours (2008)  LA Airport 17 thousand flights grounded (2007)  Power grid breakdown, NY (2003)  Düsseldorf Airport fire (1996)  Ariane 5 failure (1996)

Potential risks  Aircrafts are on the internet (disaster without explosives)  Power grid long-term breakdown  Cars and trucks can be directed and controlled through internet  Chemical plant disaster  Loss of strategic database

Types of risks -Cultural -Technical -Helth -Internet -Environment -Military -Political Comment: any injury or loss in an area can affect another areas, i.e., security is considered to be multidimensional

Definitions Security: the state of being free from danger or threat (Oxford Dictionary) Security is the process or means, physical or human, of delaying, preventing, and otherwise protecting against external or internal, defects, dangers, loss, criminals, and other individuals or actions that threaten, hinder or destroy an organization’s “steady state,” and deprive it of its intended purpose for being Security and safety will be considered together in this presentation Focus is on the engineering aspects of security and safety

General goals Minimize the risk of failure (crisis, catastrophe) Minimize the loss of failure (crisis or catastrophe) Minimize the cost of safety

Sources of risks Natural and human activities are the sources of risks and threats Types of activities:  transformation (e.g., data base management, production of gasoline from crude oil, earth-quake)  flow (crude oil in a pipe line, electricity on the network, information on the internet, cunami in the ocean)

Both transformations and flows are subject to -faulty, -unwanted or -unexpected operations primarily because of design, maintenance, and operations problems. Possible way of reducing the risks is to assure the quality of the activities In practice, it is impossible, must not consider Activities are interconnected and interdependent, therefore, risks are global

Risk is exploding Complexity increasing rapidly (introducing new types of services among the available activities) Unnecessary activities (refrigerator on the internet) Lack of quality control (speed is preferred to quality) Increasing gap between the available tools (mathematical or technical) and the complexity of the security issue

Contradiction? Security is global, cannot be solved locally Global solution is needed The solution should be systematic based on mathematical model (instead of intuitive) Global mathematical model is not solvable Solution:  Back to the basics (G. Polya)  Consider process systems engineering (PSE)

Security and PSE PSE: Process Systems Engineering Security from PSE perspectives Initialized by the chemical industry of the 1970’s Motivated by the competition (energy crisis), safety, etc. Fundamental tool: global problem is solved as a sequence of smaller subproblems Basis of the decomposition: structure of the system Illustrative examples:  Systematic vs. intuitive solution  Structure is crutial  Importance of the mathematical model

15 Systematic vs. intuitive solution Comp. Chem. Eng., 1995 Incomplete superstructure Cost: 138.7* * Other school’s work Comp. Chem. Eng., 2000 Complete superstructure Cost: 104.3** ** Our work (optimality guaranteed)

Why structure is crutial? “ The selection of the structure can typically reduce energy consumption by 50% and net- present cost by 35%” (Siirola, 1996)

Importance of the mathematical model Optimal network Kovacs, Z., F. Friedler, and L. T. Fan, Recycling in a Separation Process Structure, AIChE J., 39, (1993)‏ 17

Axioms of combinatorially feasible structures For PNS problem (P,R,O) a P-graph (m,o) satisfying the following five axioms is a combinatorially feasible network. (S1)P  m (S2)  x  m, d - (x)=0 iff x  R (S3)o  O (S4)  y 0  o  path [y 0, y n ] where y n  P (S5)  x  m,  ( ,  )  o such that x  (  )

Reduction of the search space The five axioms reduce the 34 billion combinations of the operating units to 3,465 combinatorially feasible structures for the industrial process synthesis problem of 35 op. units. The optimal solution is included in the set of 3465 feasible structures. 19

20 Reduction of the search space x

PSE in practice Example: no chemical process is develobed before it is simulated and analysed by a computer simulation program since 1980s Even a chemical process is too complex to describe its behaviour by an overall mathematical model. It is decomposed:  local structures for the global problem

UP’s contribution Research and Development  P-graph framework for PSE  Dynamic evaquation  Synthesis and analysis of integrated security systems  Design of optimal systems under reliability constraints  Supply chain management under safety requirements  Integrated synthesis of a process and its fault-tolerant control system  Sustainable process design Organization: Research and Development Center for Security Cooperation: Experts in specific areas are welcome

Concluding remarks Security is a global issue Systematic methodology is required for  minimizing the risk  minimizing the loss  minimizing the cost Unavailable PSE is a potential technology Key point: decomposition for local structures

Thank you for your attention