Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications

@article{Chockalingam2016IntegratedSA,
  title={Integrated Safety and Security Risk Assessment Methods: A Survey of Key Characteristics and Applications},
  author={Sabarathinam Chockalingam and Dina Hadziosmanovic and Wolter Pieters and Andr{\'e} Teixeira and Pieter van Gelder},
  journal={ArXiv},
  year={2016},
  volume={abs/1707.02140}
}
  • Sabarathinam Chockalingam, Dina Hadziosmanovic, +2 authors Pieter van Gelder
  • Published in CRITIS 2016
  • Computer Science
  • ArXiv
  • Over the last years, we have seen several security incidents that compromised system safety, of which some caused physical harm to people. [...] Key Method We analyze these methods based on 5 different criteria, and identify key characteristics and applications. A key outcome is the distinction between sequential and non-sequential integration of safety and security, related to the order in which safety and security risks are assessed. This study provides a basis for developing more effective integrated safety…Expand Abstract

    Tables and Topics from this paper.

    Explore Further: Topics Discussed in This Paper

    Citations

    Publications citing this paper.
    SHOWING 1-10 OF 16 CITATIONS

    INSpIRA: INtegrating Security Into Risk Assessment

    • Jürgen Dobaj
    • Computer Science
    • 2018 IEEE/ACM 13th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS)
    • 2018
    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    INSpIRA: iNtegrating security into risk assessment: doctoral project paper

    VIEW 4 EXCERPTS
    CITES BACKGROUND & METHODS
    HIGHLY INFLUENCED

    Safety and Security Co-Analyses: A Systematic Literature Review

    VIEW 1 EXCERPT
    CITES BACKGROUND

    An Adversarial Risk-based Approach for Network Architecture Security Modeling and Design

    VIEW 1 EXCERPT
    CITES BACKGROUND

    References

    Publications referenced by this paper.
    SHOWING 1-10 OF 20 REFERENCES

    Integrating cyber attacks within fault trees

    VIEW 13 EXCERPTS
    HIGHLY INFLUENTIAL

    Aligning Cyber-Physical System Safety and Security

    VIEW 9 EXCERPTS
    HIGHLY INFLUENTIAL

    Unified Security and Safety Risk Assessment - A Case Study on Nuclear Power Plant

    VIEW 4 EXCERPTS
    HIGHLY INFLUENTIAL