In this paper, a new method for quantitative security risk assessment of complex systems is presented, combining fault-tree analysis, traditionally used in reliability analysis, with the recently introduced Attack-tree analysis, proposed for the study of malicious attack patterns. The combined use of fault trees and attack trees helps the analyst to effectively face the security challenges posed by the introduction of modern ICT technologies in the control systems of critical infrastructures. The proposed approach allows considering the interaction of malicious deliberate acts with random failures. Formal definitions of fault tree and attack tree are provided and a mathematical model for the calculation of system fault probabilities is pres...
Security risk analysis is the term used to describe the analysis of critical facilities in which the...
International audienceThe introduction of connected systems and digital technology in process indust...
Information security has grown as a prominent issue in our digital life. The network security is bec...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
As the critical systems we rely on every day, such as nuclear power plants and airplanes, become eve...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Fault Trees are well-known models for the reliability analysis of systems, used to compute several k...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Cyber breaches have grown exponentially over the years, both in the number of incidents and in damag...
Efficient risk assessment requires automation of its most tedious tasks: identification of vulnerabi...
To maintain the cyber security, nuclear digital Instrumentation and Control (I&C) systems must b...
Intentional attacks towards industrial facilities are credible and potentially catastrophic. However...
Operators of industrial facilities must be able to control the risks that their installations pose t...
The development of technologies leads to the expansion of the range of services provided on the Inte...
Security risk analysis is the term used to describe the analysis of critical facilities in which the...
International audienceThe introduction of connected systems and digital technology in process indust...
Information security has grown as a prominent issue in our digital life. The network security is bec...
In this paper, a new method for quantitative security risk assessment of complex systems is presente...
Cyber physical systems, like power plants, medical devices and data centers have to meet high standa...
As the critical systems we rely on every day, such as nuclear power plants and airplanes, become eve...
International audienceAttack trees are widely used in the fields of defense for the analysis of risk...
Fault Trees are well-known models for the reliability analysis of systems, used to compute several k...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Cyber breaches have grown exponentially over the years, both in the number of incidents and in damag...
Efficient risk assessment requires automation of its most tedious tasks: identification of vulnerabi...
To maintain the cyber security, nuclear digital Instrumentation and Control (I&C) systems must b...
Intentional attacks towards industrial facilities are credible and potentially catastrophic. However...
Operators of industrial facilities must be able to control the risks that their installations pose t...
The development of technologies leads to the expansion of the range of services provided on the Inte...
Security risk analysis is the term used to describe the analysis of critical facilities in which the...
International audienceThe introduction of connected systems and digital technology in process indust...
Information security has grown as a prominent issue in our digital life. The network security is bec...