SlideShare une entreprise Scribd logo
1  sur  17
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures Roberto Filippini, Marcelo Masera Institute of Protection and Security of Citizens Joint Research Centre, European Commission Ispra, Italy
Outline ,[object Object],[object Object],[object Object],[object Object]
Introduction Critical Infrastructures Assessment? Integration/Operation? Decision making?
Introduction Critical infrastructures  –  Networked – Systems of Systems  Service-oriented   -   available anytime, anywhere production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society
A Few Features of CI Layered structure Technical-organization-management Decision making Local versus global Failure pathologies Escalation - cascade Diverse metrics Diverse dynamics Cross - borders A pool of diverse branches or a new standalone discipline? Multi-disciplinary System of Systems Networked Service oriented Available anytime-anywhere production distribution information technology communications Society
Challenges ,[object Object],[object Object],? The single system  … Scope : internal dynamics with inputs from “outside” The system of systems Scope : Dependencies and Interdependencies
Challenges (2) ,[object Object],[object Object],Upper levels Scope : managements, business, legal, etc. Slower dynamics Lower levels Scope : physical processes, controls, services  Faster dynamics Field System Operation Corporate Inter-corporate Infrastructure x Field System Operation Corporate Inter-corporate Infrastructure y
Challenges (3) ,[object Object],[object Object],Field System Operation Corporate x Infrastructure Field System Operation Corporate y Inter-corporate Dependability Risk Business continuity Service Technical Business National  Cross-borders
Challenges (4) ,[object Object],[object Object],Recovery Failure Field System Operation Corporate Inter-corporate Infrastructure x Field System Operation Corporate Inter-corporate Infrastructure y Field System Operation Corporate Inter-corporate Infrastructure z
“ Building” Knowledge on CI ,[object Object],[object Object],[object Object],[object Object],Regulations Policies Procedures Controls Governance framework DATA Modeling Observing Reproducing
Priority Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How CI reacts Metrics How CI fails
Modeling Insights 2 1 4 System 1 – Failure at system level 2 – Protection measures  3 – Local diagnostics 4 – Emergency management, cross-levels Field 3 Infrastructure TE  triggering event Service interruption Operation The failure scenario may affect several levels of the infrastructure
Modeling Insights (2) Local measures TE Triggering event End states of the infrastructure Emergency management propagation  throughout the network Local measures TE Triggering event Emergency management Restore End states of the system y Restore  End states of the system x Infrastructure x Infrastructure y TIME A failure propagates throughout the network and triggers other events
Modeling Insights (3) x1 x2 x3 y1 y2 System states may be more or less relevant depending on the perspectives System x System y 11 21 31 12 22 32 1) Compound states space : path independent 11 21 31 12 22 32 32 22 32 2) Compound states space:  path sensitive
Final Remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Final Remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

En vedette

En vedette (8)

Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management Framework
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Similaire à Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Complex Systems
Complex SystemsComplex Systems
Complex Systemseghafari
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberFrancis_McKinney
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Steve Ray
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensSirris
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Shakas Technologies
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systemsmohammed alrekabe
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsUltraUploader
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial Systemiosrjce
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mindbmenden52
 
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...IJCNCJournal
 

Similaire à Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures (20)

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Complex Systems
Complex SystemsComplex Systems
Complex Systems
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th December
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Workshop8 18 12 09 Ingles
Workshop8   18 12 09 InglesWorkshop8   18 12 09 Ingles
Workshop8 18 12 09 Ingles
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environments
 
Information systems
Information systemsInformation systems
Information systems
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
F017223742
F017223742F017223742
F017223742
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mind
 
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
 

Plus de Global Risk Forum GRFDavos

Disaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyDisaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyGlobal Risk Forum GRFDavos
 
Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Global Risk Forum GRFDavos
 
Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global Risk Forum GRFDavos
 
Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Global Risk Forum GRFDavos
 
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Global Risk Forum GRFDavos
 
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...Global Risk Forum GRFDavos
 
C&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAC&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAGlobal Risk Forum GRFDavos
 
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Global Risk Forum GRFDavos
 
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Global Risk Forum GRFDavos
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Global Risk Forum GRFDavos
 
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...Global Risk Forum GRFDavos
 
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Risk Forum GRFDavos
 
Capacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDACapacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDAGlobal Risk Forum GRFDavos
 
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Global Risk Forum GRFDavos
 
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Global Risk Forum GRFDavos
 
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Global Risk Forum GRFDavos
 
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Global Risk Forum GRFDavos
 
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Global Risk Forum GRFDavos
 
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Global Risk Forum GRFDavos
 
A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...Global Risk Forum GRFDavos
 

Plus de Global Risk Forum GRFDavos (20)

Disaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyDisaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian Doherty
 
Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...
 
Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...
 
Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...
 
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
 
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
 
C&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAC&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLA
 
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
 
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...
 
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
 
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
 
Capacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDACapacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDA
 
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
 
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
 
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
 
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
 
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
 
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
 
A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...
 

Dernier

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Dernier (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures

  • 1. Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures Roberto Filippini, Marcelo Masera Institute of Protection and Security of Citizens Joint Research Centre, European Commission Ispra, Italy
  • 2.
  • 3. Introduction Critical Infrastructures Assessment? Integration/Operation? Decision making?
  • 4. Introduction Critical infrastructures – Networked – Systems of Systems Service-oriented - available anytime, anywhere production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society
  • 5. A Few Features of CI Layered structure Technical-organization-management Decision making Local versus global Failure pathologies Escalation - cascade Diverse metrics Diverse dynamics Cross - borders A pool of diverse branches or a new standalone discipline? Multi-disciplinary System of Systems Networked Service oriented Available anytime-anywhere production distribution information technology communications Society
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Modeling Insights 2 1 4 System 1 – Failure at system level 2 – Protection measures 3 – Local diagnostics 4 – Emergency management, cross-levels Field 3 Infrastructure TE triggering event Service interruption Operation The failure scenario may affect several levels of the infrastructure
  • 13. Modeling Insights (2) Local measures TE Triggering event End states of the infrastructure Emergency management propagation throughout the network Local measures TE Triggering event Emergency management Restore End states of the system y Restore End states of the system x Infrastructure x Infrastructure y TIME A failure propagates throughout the network and triggers other events
  • 14. Modeling Insights (3) x1 x2 x3 y1 y2 System states may be more or less relevant depending on the perspectives System x System y 11 21 31 12 22 32 1) Compound states space : path independent 11 21 31 12 22 32 32 22 32 2) Compound states space: path sensitive
  • 15.
  • 16.
  • 17.

Notes de l'éditeur

  1. 10/06/10 04:29 PM Page