0%

Book Description

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these products and services to our personal preferences is expected and made possible by intelligence that is enabled by communication between them. Ensuring that the systems of these connected products operate safely, without creating hazards to us and those around us, is the focus of this book, which presents the central topics of current research and practice in systems safety and security as it relates to applications within transportation, energy, and the medical sciences.

Each chapter is authored by one of the leading contributors to the current research and development on the topic. The perspective of this book is unique, as it takes the two topics, systems safety and systems security, as inextricably intertwined. Each is driven by concern about the hazards associated with a system’s performance.

  • Presents the most current and leading edge research on system safety and security, featuring a panel of top experts in the field
  • Includes several research advancements published for the first time, including the use of ‘goal structured notation’ together with a ‘judgment calculus’ and their automation as a ‘rule set’ to facilitate systems safety and systems security process execution in compliance with existing standards
  • Presents for the first time the latest research in the field with the unique perspective that systems safety and systems security are inextricably intertwined
  • Includes coverage of systems architecture, cyber physical systems, tradeoffs between safety, security, and performance, as well as the current methodologies and technologies and implantation practices for system safety and security

Table of Contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Dedication
  6. About the Editor
  7. About the Contributors
  8. Introduction
  9. Part I: Systems
    1. 1. Editor’s Preface
      1. 1.1 The Need for a Broadly Targeted Handbook of System Safety and Security
      2. Part I: Systems
      3. Part II: Perspectives on Safety and Security
      4. Part III: Applications of System Safety and Security
    2. 2. Composition and Compositionality in CPS
      1. Abstract
      2. 2.1 Introduction
      3. 2.2 Horizontal Integration Platforms in the OpenMETA Tool Suite
      4. 2.3 AVM Component Model
      5. 2.4 Use Case for Semantic Integration
      6. 2.5 Component Interfaces and Composition Semantics for Dynamics
      7. 2.6 Formalization of the Semantic Interface for Modeling Languages
      8. 2.7 Conclusion
      9. Acknowledgments
      10. References
    3. 3. Software Engineering for Model-Based Development by Domain Experts
      1. Abstract
      2. 3.1 Introduction and Motivation
      3. 3.2 Development Process: How Do You Engineer Software?
      4. 3.3 Requirements: What Should Your Software Do?
      5. 3.4 Design: How Will Your Software Do What It Does?
      6. 3.5 Implementation: Generating Code
      7. 3.6 Verification and Validation: How Do You Know Your Software Is Good?
      8. 3.7 Conclusion and Future Work
      9. References
  10. Part II: Perspectives on Safety and Security
    1. 4. Evolving Security
      1. Abstract
      2. 4.1 Need for Security in a Cyber-Physical System
      3. 4.2 New Adversary Modeling
      4. 4.3 “Connected” System Security Modeling
      5. 4.4 Directional Threat Assessment
      6. 4.5 Big Picture CPS Systems—IoT
      7. 4.6 Conclusion
      8. References
    2. 5. The Business of Safety
      1. Abstract
      2. 5.1 Introduction
      3. 5.2 Life Cycle of Safety
      4. 5.3 Management of Functional Safety
      5. 5.4 Conclusion
      6. References
    3. 6. Cybersecurity for Commercial Advantage
      1. Abstract
      2. 6.1 Turbulence Along the Value Chain
      3. 6.2 Resilience for Commercial Advantage
    4. 7. Reasoning About Safety and Security: The Logic of Assurance
      1. Abstract
      2. 7.1 Introduction
      3. 7.2 A Strategy for Safety Case Construction
      4. 7.3 Decomposing the Functions of a Safety Critical System
      5. 7.4 Formal Reasoning for Safety Properties
      6. 7.5 Assurance Case Logic
      7. 7.6 Future Challenges
      8. 7.7 Conclusion
      9. References
      10. Annex: Electronic Throttle Control (ETC)
    5. 8. From Risk Management to Risk Engineering: Challenges in Future ICT Systems
      1. Abstract
      2. 8.1 Introduction
      3. 8.2 Key Aspects of Future ICT Systems
      4. 8.3 Evolution of Risk Approaches and Models
      5. 8.4 Risk Engineering
      6. 8.5 Case Study: Block-Chain Technology
      7. 8.6 Model-Based and Language-Based Risk Engineering
      8. 8.7 Summary and Conclusions
      9. Acknowledgments
      10. References
  11. Part III: Applications of System Safety and Security
    1. 9. A Design Methodology for Developing Resilient Cloud Services
      1. Abstract
      2. 9.1 Motivations
      3. 9.2 Resilient Cloud Services Design Methodology
      4. 9.3 RCS Architecture
      5. 9.4 Experimental Results and Evaluation
      6. 9.5 Conclusions and Future Work
      7. Acknowledgments
      8. References
    2. 10. Cloud and Mobile Cloud Architecture, Security and Safety
      1. Abstract
      2. 10.1 Introduction to Cloud Computing
      3. 10.2 Architecture: From the Cloud to the Mobile Cloud
      4. 10.3 Safety Concerns
      5. 10.4 Cloud Security
      6. References
    3. 11. A Brief Introduction to Smart Grid Safety and Security
      1. Abstract
      2. 11.1 Introduction to the Smart Grid
      3. 11.2 Safety Analysis for the Grid
      4. 11.3 A Security Analysis for the Smart Grid System
      5. References
      6. Appendix A An example of the Hazard Analysis and Risk Assessment Model Worksheet
    4. 12. The Algebra of Systems and System Interactions with an Application to Smart Grid
      1. Abstract
      2. 12.1 Design Behind Success of a Smart Grid
      3. 12.2 Trends in Renewable Energy Integration
      4. 12.3 Power Systems Laws
      5. 12.4 A Cyber-Physical System Algebra
      6. 12.5 Illustration
      7. 12.6 Conclusion
      8. References
  12. Index
54.198.200.128