An efficient process to reduce infrastructure vulnerabilities facing malevolence

Abstract In daily life, we are all used to frequent ‘systems’: public transports, industrial parks, shopping areas, stadiums or many others. And with the exponential increase of technologies, we are now living in a kind of ‘open World’ within which goods, persons or information are moving increasingly faster. The consequence is an amazing new way of life and also a number of new threats for our society. To insure the security of all citizens, and also of infrastructures, national skills or anything else, we need to secure our systems efficiently. To do so, we need appropriate tools to accurately analyze vulnerabilities in order to counter all kinds of malevolence. After giving an overview of different methods linked to that problem, we will explain our process to analyze the vulnerabilities of a complex infrastructure and what points are fundamental to take into account facing human aggressions.

[1]  T. Saaty,et al.  The Analytic Hierarchy Process , 1985 .

[2]  James V. Hansen,et al.  Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection , 2007, Decis. Support Syst..

[3]  Bertrand Munier,et al.  Choix multicritères dans le risque et variables multidimensionnelles: proposition de méthode et application aux réseaux de transport d'énergie , 1999, RAIRO Oper. Res..

[4]  Pierre Perilhon MOSAR - Présentation de la méthode , 2015, Sécurité et gestion des risques.

[5]  John C. McDonald,et al.  Confronting the risks of terrorism: making the right decisions , 2004, Reliab. Eng. Syst. Saf..

[6]  T. Ross Fuzzy Logic with Engineering Applications , 1994 .

[7]  Wolfgang Kröger,et al.  Critical infrastructures at risk: A need for a new conceptual approach and extended analytical tools , 2008, Reliab. Eng. Syst. Saf..

[8]  John Darby Evaluation of Terrorist Risk Using Belief and Plausibility (PSAM-0384) , 2006 .

[9]  Kathryn B. Laskey,et al.  An Application of Bayesian Networks to Antiterrorism Risk Management for Military Planners , 2005 .

[10]  Brian Randell,et al.  Software dependability: a personal view , 1995 .

[11]  Christopher A. Dieckmann,et al.  Robust Decision Making , 2010 .

[12]  J-C. Laprie,et al.  DEPENDABLE COMPUTING AND FAULT TOLERANCE : CONCEPTS AND TERMINOLOGY , 1995, Twenty-Fifth International Symposium on Fault-Tolerant Computing, 1995, ' Highlights from Twenty-Five Years'..

[13]  L. Branscomb Protecting civil society from terrorism: the search for a sustainable strategy , 2004 .

[14]  David Michaud,et al.  Screening Vulnerabilities in Water-Supply Networks (PSAM-0250) , 2006 .

[15]  Eric Chatelet,et al.  Are safety and security in industrial systems antagonistic or complementary issues , 2008 .

[16]  Raymond Aron,et al.  Penser la guerre, Clausewitz , 1978 .

[17]  Raymond Aron,et al.  Clausewitz, philosopher of war , 1983 .

[18]  David Michaud Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems , 2005 .

[19]  Barry Charles Ezell,et al.  Infrastructure Vulnerability Assessment Model (I‐VAM) , 2007, Risk analysis : an official publication of the Society for Risk Analysis.

[20]  Wolfgang Kröger,et al.  Risk assessment of regional systems , 2000, Reliab. Eng. Syst. Saf..

[21]  George E. Apostolakis,et al.  Bulk power risk analysis: Ranking infrastructure elements according to their risk significance , 2008 .

[22]  Le Moigne,et al.  La théorie du système général : théorie de la modélisation , 1984 .

[23]  Nancy G. Leveson,et al.  Integrated safety analysis of requirements specifications , 1997, Proceedings of ISRE '97: 3rd IEEE International Symposium on Requirements Engineering.