SlideShare une entreprise Scribd logo
1  sur  12
F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures presented by Francesco Flammini Ansaldo STS Italy – Business Innovation Unit University Federico II of Naples – Department of Computer and Systems Engineering 3rd International Workshop on Critical Information Infrastructures Security CRITIS’08 October 13-15 2008, Frascati (Rome), Italy
Critical Infrastructure Security ,[object Object],[object Object],Analysis and assessment Remediation Indications and warning Mitigation Response Reconstitution Pre-Event Post-Event Event
Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quantitative Definition of Risk ,[object Object],[object Object],[object Object],[object Object]
Effect of Protection Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extensive Risk Formula ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Return on investment ,[object Object],[object Object],Investment in Risk Reduction Measures (€) Residual Risk Typical risk reduction curve for  safety incidents  with an optimized incremental investments order Typical risk reduction curve for  security incidents  with an optimized incremental investments order 1 st   investment 2 nd  investment further investments with lower  cost-effectiveness Installation of Backbone Network CCTV Installation Digital Video Recording Access Control and Intrusion Detection Systems Operational and System Integration  Blast Containment Trash Cans Advanced Security Management System
The Q-RA tool: software architecture ,[object Object],[object Object]
Example application THREATS PROTECTION MECHANISMS
Q-RA GUI: example inputs and outputs
Conclusions & future works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you for your kind attention. Any questions?

Contenu connexe

Similaire à Critis08 Q Ra

Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachIJNSA Journal
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Community Protection Forum
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...IAEME Publication
 
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...IJNSA Journal
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...idescitation
 
F041123639
F041123639F041123639
F041123639IOSR-JEN
 
Chapter Nine(1).docx
Chapter Nine(1).docxChapter Nine(1).docx
Chapter Nine(1).docxAbebaw Mamaru
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
 
Available online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxAvailable online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxrock73
 
Risk and Safety in Work Environments
Risk and Safety in Work EnvironmentsRisk and Safety in Work Environments
Risk and Safety in Work EnvironmentsMahsa Teimourikia
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
 
Petri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical VulnerabilityPetri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical Vulnerabilitystefanounina2
 
Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Francesco Flammini
 

Similaire à Critis08 Q Ra (20)

Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 
Ijciet 10 02_001
Ijciet 10 02_001Ijciet 10 02_001
Ijciet 10 02_001
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
 
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
F041123639
F041123639F041123639
F041123639
 
Chapter Nine(1).docx
Chapter Nine(1).docxChapter Nine(1).docx
Chapter Nine(1).docx
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Available online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxAvailable online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docx
 
Risk and Safety in Work Environments
Risk and Safety in Work EnvironmentsRisk and Safety in Work Environments
Risk and Safety in Work Environments
 
Icra poster
Icra posterIcra poster
Icra poster
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
 
Petri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical VulnerabilityPetri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical Vulnerability
 
Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...
 

Plus de Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfFrancesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfFrancesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfFrancesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateFrancesco Flammini
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyFrancesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingFrancesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiFrancesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNUFrancesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual couplingFrancesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietyFrancesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560Francesco Flammini
 

Plus de Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 

Dernier

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Dernier (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Critis08 Q Ra

  • 1. F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures presented by Francesco Flammini Ansaldo STS Italy – Business Innovation Unit University Federico II of Naples – Department of Computer and Systems Engineering 3rd International Workshop on Critical Information Infrastructures Security CRITIS’08 October 13-15 2008, Frascati (Rome), Italy
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Example application THREATS PROTECTION MECHANISMS
  • 10. Q-RA GUI: example inputs and outputs
  • 11.
  • 12. Thank you for your kind attention. Any questions?