Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure

被引:41
|
作者
van Staalduinen, Mark Adrian [1 ]
Khan, Faisal [1 ]
Gadag, Veeresh [1 ,2 ]
Reniers, Genserik [1 ,3 ]
机构
[1] Mem Univ, Fac Engn & Appl Sci, Ctr Risk Integr & Safety Engn, St John, NF A1B 3X5, Canada
[2] Mem Univ, Div Community Hlth & Humanities, St John, NF A1B 3V6, Canada
[3] Delft Univ Technol, Safety & Secur Sci Grp S3G, NL-2600 AA Delft, Netherlands
关键词
Quantitative security risk analysis; Bayesian network; Bow-Tie risk model; SYSTEMS; TREES;
D O I
10.1016/j.ress.2016.08.014
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This article proposes a quantitative security risk assessment methodology that can assist management in the decision-making process where and when to protect critical assets of a chemical facility. An improvement upon previous work is the approach of conducting concurrent Threat and Vulnerability Assessments, as opposed to a sequential approach. Furthermore, this method introduces a Bow Tie risk model mapped into a Bayesian Network model that allows for various logical relaxation assumptions to be applied. Different uncertainty relaxation approaches such as "Noisy-OR" and "Leaky Noisy-OR" and "Noisy-AND" are tested to improve Threat and Vulnerability likelihood. Finally, integrating threat/vulnerability likelihood with potential losses, the security risk is quantified. The potential security countermeasures are characterized into either decreasing vulnerability or decreasing threat likelihood and are reassessed considering a cost analysis. A theoretical case study is conducted to exemplify the execution and application of the proposed method. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 50 条
  • [1] Cyber security: Protecting critical infrastructure in a changing world
    Obermeier, S. (sebastian.obermeier@ch.abb.com), 1600, ABB Corporate Management Services AG
  • [2] Protecting Critical Infrastructure by Identifying Pathways of Exposure to Risk
    O'Neill, Philip
    TECHNOLOGY INNOVATION MANAGEMENT REVIEW, 2013, : 34 - 40
  • [3] System Modeling and Risk Analysis using AADL for Critical Infrastructure Security
    Gezgin, Serhat
    Uras, Emel
    Eroglu, Emre
    Altay, Levent
    Bahtiyar, Serif
    Gur, Gurkan
    2015 7TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2015,
  • [4] Environmental security, critical infrastructure and risk assessment
    Belluck, D. A.
    Hull, R. N.
    Benjamin, S. L.
    Alcorn, J.
    Linkov, I.
    ENVIRONMENTAL SECURITY IN HARBORS AND COASTAL AREAS: MANAGEMENT USING COMPARATIVE RISK ASSESSMENT AND MULTI-CRITERIA DECISION ANALYSIS, 2007, : 3 - +
  • [5] Security Challenges and Methods for Protecting Critical Infrastructure Cyber-Physical Systems
    Taylor, James M., Jr.
    Sharif, Hamid R.
    2017 INTERNATIONAL CONFERENCE ON SELECTED TOPICS IN MOBILE AND WIRELESS NETWORKING (MOWNET), 2017, : 125 - 130
  • [6] Achieving efficiency in quantitative risk analysis process - Application on infrastructure projects
    Nabawy, Mohamed
    Khodeir, Laila M.
    AIN SHAMS ENGINEERING JOURNAL, 2021, 12 (02) : 2303 - 2311
  • [7] Quantitative Information Security Vulnerability Assessment for Norwegian Critical Infrastructure
    Liao, Yi-Ching
    CRITICAL INFORMATION INFRASTRUCTURES SECURITY, CRITIS 2020, 2020, 12332 : 31 - 43
  • [8] Critical Infrastructure Cyber-Security Risk Management
    Spyridopoulos, Theodoros
    Maraslis, Konstantinos
    Tryfonas, Theo
    Oikonomou, George
    TERRORISTS' USE OF THE INTERNET: ASSESSMENT AND RESPONSE, 2017, 136 : 59 - 76
  • [10] CIIP-ram - A security risk analysis methodology for critical information infrastructure protection
    Busuttil, TB
    Warren, AJ
    INFORMATION SECURITY MANAGEMENT, EDUCATION AND PRIVACY, 2004, 148 : 33 - 49