Critical Infrastructure Systems of Systems Assessment Methodology

Assessing the risk of malevolent attacks against large-scale critical infrastructures requires modifications to existing methodologies that separately consider physical security and cyber security. This research has developed a risk assessment methodology that explicitly accounts for both physical and cyber security, while preserving the traditional security paradigm of detect, delay, and respond. This methodology also accounts for the condition that a facility may be able to recover from or mitigate the impact of a successful attack before serious consequences occur. The methodology uses evidence-based techniques (which are a generalization of probability theory) to evaluate the security posture of the cyber protection systems. Cyber threats are compared against cyber security posture using a category-based approach nested within a path-based analysis to determine the most vulnerable cyber attack path. The methodology summarizes the impact of a blended cyber/physical adversary attack in a conditional risk estimate where the consequence term is scaled by a ''willingness to pay'' avoidance approach.

[1]  Carol-Sophie Smidts,et al.  Probabilistic reactor dynamics. III: A framework for time-dependent interaction between operator and reactor during a transient involving human error , 1992 .

[2]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[3]  Vincent C. Tidwell,et al.  Threat Assessment of Water Supply Systems Using Markov Latent Effects Modeling , 2004 .

[4]  W E Vesely,et al.  Fault Tree Handbook , 1987 .

[5]  Clifford Goodman,et al.  American Society of Mechanical Engineers , 1988 .

[6]  Jason Edwin Stamp,et al.  Framework for SCADA Security Policy , 2005 .

[7]  P. Sholander,et al.  Risk assessment for physical and cyber attacks on critical infrastructures , 2005, MILCOM 2005 - 2005 IEEE Military Communications Conference.

[8]  Moosung Jae,et al.  The Use of Influence Diagrams for Evaluating Severe Accident Management Strategies , 1992 .

[9]  Jon C. Helton,et al.  Evidence Theory for Engineering Applications , 2004 .

[10]  José G. Martín,et al.  Reliability and Risk Analysis—Methods and Nuclear Power Applications , 1984 .

[11]  Daniel C. Rees,et al.  Managing and Protecting Infrastructure Assets , 2003 .

[12]  Jason Edwin Stamp,et al.  A classification scheme for risk assessment methods. , 2004 .

[13]  George J. Klir,et al.  Fuzzy sets and fuzzy logic - theory and applications , 1995 .

[14]  Gregory Dane Wyss,et al.  Comparison of two methods to quantify cyber and physical security effectiveness. , 2005 .

[15]  Jane M. Booker,et al.  Eliciting and analyzing expert judgement - a practical guide , 2001, ASA-SIAM series on statistics and applied probability.

[16]  John L. Darby Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets. , 2006 .

[17]  M. Murphy,et al.  Risk-based assessment of the surety of information systems , 1995 .

[18]  Thomas L. Saaty,et al.  Decision making for leaders , 1985, IEEE Transactions on Systems, Man, and Cybernetics.

[19]  S. Kaplan,et al.  On The Quantitative Definition of Risk , 1981 .

[20]  Gregory D. Wyss,et al.  An Object-Oriented Approach to Risk and Reliability Analysis: Methodology and Aviation Safety Applications , 2004, Simul..

[21]  Anna M. Bonner,et al.  Acknowledgments , 2019, The Neurodiagnostic journal.

[22]  Richard L. Craft,et al.  The Use of Object-Oriented Analysis Methods in Surety Analysis , 1999 .

[23]  J. Devooght,et al.  Probabilistic Reactor Dynamics —I: The Theory of Continuous Event Trees , 1992 .

[24]  Richard P. Lippmann,et al.  An Annotated Review of Past Papers on Attack Graphs , 2005 .

[25]  Edward R. Dougherty,et al.  Probability and Statistics for the Engineering, Computing and Physical Sciences , 1990 .

[26]  Thomas L. Saaty,et al.  Multicriteria Decision Making: The Analytic Hierarchy Process: Planning, Priority Setting, Resource Allocation , 1990 .

[27]  J. Charles Kerkering,et al.  Eliciting and Analyzing Expert Judgment, A Practical Guide , 2002, Technometrics.

[28]  Felicia Angelica Duran,et al.  OBEST: The Object-Based Event Scenario Tree Methodology , 2001 .

[29]  Thomas L. Saaty,et al.  Decision Making for Leaders: The Analytical Hierarchy Process for Decisions in a Complex World , 1982 .

[30]  Ronald R. Yager,et al.  Arithmetic and Other Operations on Dempster-Shafer Structures , 1986, Int. J. Man Mach. Stud..

[31]  D. Engi,et al.  The vital issues process: Strategic planning for a changing world , 1995 .

[32]  David Patrick Duggan Generic threat profiles. , 2005 .

[33]  S. Kaplan On The Method of Discrete Probability Distributions in Risk and Reliability Calculations–Application to Seismic Risk Assessment , 1981 .

[34]  Joseph J. Cramer,et al.  Risk assessment and risk management for the chemical process industry , 1991 .

[35]  Didier Dubois,et al.  Possibility Theory - An Approach to Computerized Processing of Uncertainty , 1988 .