A review of combined safety and security risk analysis approaches: Application and Classification

被引:2
作者
Oueidat, Tamara [1 ]
Flaus, Jean-Marie [1 ]
Masse, Francois [2 ]
机构
[1] Univ Grenoble Alpes, G SCOP Lab, Grenoble, France
[2] INERIS, Direct Risques Accidentels, Paris, France
来源
2020 INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND DIAGNOSIS (ICCAD) | 2020年
关键词
Safety; Cyber-security; Undesirable event; Risk analysis;
D O I
10.1109/iccad49821.2020.9260512
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For many years, malicious cyber-attackers have been targeting the industrial control systems (ICSs) that manage the critical infrastructure. Industries become vulnerable to cyber-attacks, following the introduction of new technologies in their production processes. Cyber-security becomes a critical subject that treatment can be improved: it is a little taken into consideration in humans and environmental risk analysis, despite the common points with the risks related to cyber-security. In this article the approaches that combined the security and safety in risk analysis are presented and applied to a case study to evaluate and compare them, this evaluation allows us to find the best way to propose our future risk analysis approach.
引用
收藏
页码:354 / 360
页数:7
相关论文
共 26 条
[1]  
Abdo H., 2017, A new approach that considers cyber security within industrial risk analysis using a cyber bow-tie analysis
[2]  
[Anonymous], 2017, P INT C COMP SAF REL
[3]  
[Anonymous], 2015, CPSS 2015, DOI DOI 10.1145/2732198.2732204
[4]  
[Anonymous], 2017, P WORKSH ASSURE DECO
[5]   A review of cyber security risk assessment methods for SCADA systems [J].
Cherdantseva, Yulia ;
Burnap, Pete ;
Blyth, Andrew ;
Eden, Peter ;
Jones, Kevin ;
Soulsby, Hugh ;
Stoddart, Kristan .
COMPUTERS & SECURITY, 2016, 56 :1-27
[6]  
Chockalingam S., 2016, Proceedings of International Conference on Critical Information Infrastructures Security, P50
[7]   A Lightweight Threat Analysis Approach Intertwining Safety and Security for the Automotive Domain [J].
Duerrwang, Juergen ;
Beckers, Kristian ;
Kriesten, Reiner .
COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2017, 2017, 10488 :305-319
[8]  
Ericson C.A., 2015, HAZARD ANAL TECHNIQU
[9]   Handling and updating uncertain information in bow-tie analysis [J].
Ferdous, Refaul ;
Khan, Faisal ;
Sadiq, Rehan ;
Amyotte, Paul ;
Veitch, Brian .
JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2012, 25 (01) :8-19
[10]  
Flaus J.-M, 2019, CYBERSECURITE SYSTEM