26,217 research outputs found

    Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

    Get PDF
    Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. Meanwhile, various risk assessment methods have been developed that integrate safety and security, and these could help to address the corresponding threats by implementing suitable risk treatment plans. However, an overarching overview of these methods, systematizing the characteristics of such methods, is missing. In this paper, we conduct a systematic literature review, and identify 7 integrated safety and security risk assessment methods. We analyze these methods based on 5 different criteria, and identify key characteristics and applications. A key outcome is the distinction between sequential and non-sequential integration of safety and security, related to the order in which safety and security risks are assessed. This study provides a basis for developing more effective integrated safety and security risk assessment methods in the future

    The safety case and the lessons learned for the reliability and maintainability case

    Get PDF
    This paper examine the safety case and the lessons learned for the reliability and maintainability case

    Assessing and augmenting SCADA cyber security: a survey of techniques

    Get PDF
    SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities. The pervasiveness, miniaturisations and declining costs of internet connectivity have transformed these systems from strictly isolated to highly interconnected networks. The connectivity provides immense benefits such as reliability, scalability and remote connectivity, but at the same time exposes an otherwise isolated and secure system, to global cyber security threats. This inevitable transformation to highly connected systems thus necessitates effective security safeguards to be in place as any compromise or downtime of SCADA systems can have severe economic, safety and security ramifications. One way to ensure vital asset protection is to adopt a viewpoint similar to an attacker to determine weaknesses and loopholes in defences. Such mind sets help to identify and fix potential breaches before their exploitation. This paper surveys tools and techniques to uncover SCADA system vulnerabilities. A comprehensive review of the selected approaches is provided along with their applicability

    The rise and fall of the fast breeder reactor technology in the UK: between engineering “dreams” and economic “realities”?

    Get PDF
    This report explores the evolution of the fast breeder nuclear reactor programmes in the UK, from the period of great promises and expectations in the 1950s and 1960s towards their progressive abandonment in the 1980s and 1990s. The project, of which this report is an element, aims thereby to draw lessons relevant for the current “nuclear renaissance” and medium-term planning on the future of nuclear power. Given that the fast breeder programmes were closely interlinked with the general evolution of nuclear power in the UK, this report includes a fairly detailed historical description of this more general ‘nuclear context’. This primarily chronological description of the evolution of the UK fast breeder programmes provides a basis for a comparison between the evolution of the British and French fast breeder reactor programmes. A central question in such a comparison concerns the lateness of the abandonment of the fast breeder programme in France, as compared to most other countries developing this technology. The cross-country comparison will explore the relative influence of the contextual and historical conditions within which the nuclear technologies have evolved in France and the UK on the one hand, and the ‘universal’ factors common to the evolution of socio-technical systems in general on the other. This exploratory research was based on documentary analysis and eleven interviews of experts involved in, or with knowledge of, the UK fast breeder reactor (FBR) programmes
    • 

    corecore