DEFINE central topics: Critical infrastructures interdependencies Marcelo Masera Joint Research Centre DEFINE workshop 26-27 November 2002, Pisa.

Slides:



Advertisements
Similar presentations
Project management.
Advertisements

SAFEFOODERA Stakeholder Group Meeting with Retailers – Emerging Risks – Ljubljana, February 2007.
Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Risk Management Awareness Presentation
DESEREC, an ICT for Trust and Security project DESEREC: Dependability and Security by Enhanced Reconfigurability.
Vulnerability of Complex System Lokaltermin des ETH-Präsidenten Mittwoch, 1. Juli 2009 Laboratory for Safety Analysis.
Dependability ITV Model-based Analysis and Design of Embedded Software Techniques and methods for Critical Software Anders P. Ravn Aalborg University August.
Markov Reward Models By H. Momeni Supervisor: Dr. Abdollahi Azgomi.
Health Aspect of Disaster Risk Assessment Dr AA Abubakar Department of Community Medicine Ahmadu Bello University Zaria Nigeria.
© 2006 IBM Corporation IBM Software Group Relevance of Service Orientated Architecture to an Academic Infrastructure Gareth Greenwood, e-learning Evangelist,
Dependability TSW 10 Anders P. Ravn Aalborg University November 2009.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
CSE 322: Software Reliability Engineering Topics covered: Dependability concepts Dependability models.
©Ian Sommerville 2006Software Engineering, 8th edition. Chapter 30 Slide 1 Security Engineering.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Consideration for Information Security Issues in Geospatial Information Services of Local Governments Makoto Hanashima Institute for Areal Studies, Foundation.
Software Fault Tolerance – The big Picture mMIC-SFT September 2003 Anders P. Ravn Aalborg University.
Critical Infrastructure Interdependencies H. Scott Matthews March 30, 2004.
EEC 693/793 Special Topics in Electrical Engineering Secure and Dependable Computing Lecture 2 Wenbing Zhao Department of Electrical and Computer Engineering.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Summary and Safety Assessment mMIC-SFT November 2003 Anders P. Ravn Aalborg University.
Project Management Hoang Huu Hanh, Hue University hanh-at-hueuni.edu.vn.
Quality Risk Management ICH Q9 Annex I: Methods & Tools
Dynamic Islanding of Critical Infrastructures, a Suitable Strategy to Survive and Mitigate Critical Events Joint Infrastructure Interdependencies Research.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 2 Slide 1 Systems engineering 1.
1 Prediction of Software Reliability Using Neural Network and Fuzzy Logic Professor David Rine Seminar Notes.
Session 16: Distribution of Geospatial Data 1 Distribution of Geospatial Data in the Public Environment Hazard Mapping and Modeling.
Project management DeSiaMore 1.
1 Chapter 2 Socio-technical Systems (Computer-based System Engineering)
1 BTEC HNC Systems Support Castle College 2007/8 Systems Analysis Lecture 9 Introduction to Design.
Topic (1)Software Engineering (601321)1 Introduction Complex and large SW. SW crises Expensive HW. Custom SW. Batch execution.
Data Mining Process A manifestation of best practices A systematic way to conduct DM projects Different groups has different versions Most common standard.
VoIP Security in Service Provider Environment Bogdan Materna Chief Technology Officer Yariba Systems.
Dependability in FP 6 Brian Randell Pisa Workshop, November 2002.
Module 4: Systems Development Chapter 12: (IS) Project Management.
Implementation and process evaluation: developing our approach Ann Lendrum University of Manchester Neil Humphrey University of Manchester Gemma Moss Institute.
Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Extended Enterprise Risk: Managing Complexity in 21 st Century Organisations Carolyn Williams, Technical Director, Institute of Risk Management 30 January.
Management & Development of Complex Projects Course Code MS Project Management Perform Qualitative Risk Analysis Lecture # 25.
1 Smart Grid Cyber Security Annabelle Lee Senior Cyber Security Strategist Computer Security Division National Institute of Standards and Technology June.
Socio-technical Systems (Computer-based System Engineering)
Building Dependable Distributed Systems Chapter 1 Wenbing Zhao Department of Electrical and Computer Engineering Cleveland State University
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 5 Slide 1 Project management.
Chapter 3 Project Management Chapter 3 Project Management Organising, planning and scheduling software projects.
11th International Symposium Loss Prevention 2004 Prague Ľudovít JELEMENSKÝ Department of Chemical and Biochemical Engineering, STU BRATISLAVA, SLOVAKIA.
1 Project management. 2 Topics covered Management activities Project planning Project scheduling Risk management.
IMPACT 3-5th November 20044th IMPACT Project Workshop Zaragoza 1 Investigation of extreme flood Processes and uncertainty IMPACT Investigation of Extreme.
Basic Concepts of Dependability Jean-Claude Laprie DeSIRE and DeFINE Workshop — Pisa, November 2002.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Slide 1 Security Engineering. Slide 2 Objectives l To introduce issues that must be considered in the specification and design of secure software l To.
FOCISS a strategy tool for sustainable innovation1 Focusing Innovation Strategy for Sustainability a practice based approach for SME’s Jan Venselaar (FOCISS.
Application of Fault Injection to Globus Grid Middleware Nik Looker & Jie Xu University of Leeds, Leeds. LS2 9JT, UK Tianyu Wo & Jinpeng Huai Beihang University,
Project management 1/30/2016ICS 413 – Software Engineering1.
Attributes Availability Reliability Safety Confidentiality Integrity Maintainability Dependability Means Fault Prevention Fault Tolerance Fault Removal.
Responsive Innovation for Disaster Mitigation Gordon A. Gow University of Alberta.
Managing Quality & Risk Week September The Properties of Risk Management Module leader – Tim Rose.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
Software Dependability
Crisis management related research at
Risk Assessment.
Figure 3: TSN Analysis Methodology
Introduction to Information Security
Critical Infrastructure Protection Policy Priorities
Security Engineering.
RISK MANAGEMENT An Overview: NIPC Model
Cyber System-Centric Approach To Cyber Security and CIP
Chapter 9 – Software Evolution and Maintenance
Planning for IT Audit Session 4.
Building a “System” Moving from writing a program to building a system. What’s the difference?! Complexity, size, complexity, size complexity Breadth.
Luca Simoncini PDCC, Pisa and University of Pisa, Pisa, Italy
Presentation transcript:

DEFINE central topics: Critical infrastructures interdependencies Marcelo Masera Joint Research Centre DEFINE workshop November 2002, Pisa

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 2 Origin: CIP policies, not technical Dependency: –“A linkage or connection between two infrastructures, through which the state of one infrastructure influences or is correlated to the state of the other”. Rinaldi, Peerenboom, Kelly, “Critical Infrastructure Interdependencies” (IEEE Control Systems Magazine, Dec 01) According to this definition dependencies are not predominantly a dependability issue. –“Influences…” –“Is correlated…” A vague concept

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 3 “Everything is interdependent..” As a consequence, everything depends on almost everything else… But without any consideration of their criticality – no links to faults, errors, failures! For instance: –“An infrastructure has a cyber interdependency if its state depends on information transmitted through the information infrastructure”. Rinaldi et al.

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 4 Interdependency pathologies Some linkages among systems (structural interconnections, behavioural interactions, functional couplings) are related to the creation and manifestation of faults, errors and failures. Characteristic: –The pathology chain develops across systems: fault in system A, failure in system B These are dependability- and risk-relevant “dependencies”

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 5 Infrastructure interdependencies  Infrastructure interdependencies are a main concern:  Potential impact on critical services  Complex phenomena: non-linearity, hidden vulnerabilities, unforeseen emergent behaviour…  Many factors: technical, organisational, human  No proven systematic approach yet

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 6 ExampleExample Infrastructure Alfa (IA) has a dependency on the Information Infrastructure (II): –An information asset of IA flows through II –A fault in II provokes an error (e.g. delay) –This error provokes a failure in IA Infrastructure Alfa Information Infrastructure Information asset Fault (e.g. scarce bandwidth) Failure (e.g. service unavailability) Error (e.g. signal delay)

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 7 Peculiarity of (inter)dependencies FaultErrorFailure Occurs in system B Might occur in system A or B Occurs in system A The pathology of interdependencies cuts across system boundaries

DEFINE workshop, Pisa, November 2002 JOINT RESEARCH CENTRE M. Masera 8 Tasks for DeFINE 1.Identification and characterization of interdependencies –Inventory of real world cases (power, health, finance…) –Follow on from I3V & STRIVE communities 2.Dependability foundations for infrastructure interdependencies: –Attributes (reliability, availability, confidentiality, integrity…) –Threats (fault, errors, failures); Design faults, human- machine interactions, physical… –Failure pathologies (dormancy, activation, propagation, causation, service interfaces …) 3. Applicability of dependability means: –Prevention, tolerance, removal, forecasting 4. Applicability of dependability & risk assessment technologies: –Methods, techniques, tools