scholarly journals The Risk Assessment of ERTMS-Based Railway Systems from a Cyber Security Perspective: Methodology and Lessons Learned

Author(s):  
Robin Bloomfield ◽  
Marcus Bendele ◽  
Peter Bishop ◽  
Robert Stroud ◽  
Simon Tonks
Author(s):  
Pooja Sharma ◽  
Karan Veer

: It was 11 March 2020 when the World Health Organization (WHO) declared the name COVID-19 for coronavirus disease and also described it as a pandemic. Till that day 118,000 cases were confirmed of pneumonia with breathing problem throughout the world. At the start of New Year when COVID-19 came into knowledge a few days later, the gene sequencing of the virus was revealed. Today the number of confirmed cases is scary, i.e. 9,472,473 in the whole world and 484,236 deaths have been recorded by WHO till 26 June 2020. WHO's global risk assessment is very high [1]. The report is enlightening the lessons learned by India from the highly affected countries.


Coronaviruses ◽  
2020 ◽  
Vol 01 ◽  
Author(s):  
Silvana Mirella Aliberti ◽  
Francesco De Caro ◽  
Giovanni Boccia ◽  
Rosario Caruso ◽  
Mario Capunzo

: Italy was the first western nation affected by the pandemic and was observed as a pilot case in the management of the new coronavirus epidemic. The outbreak of COVID-19 disease has been very difficult in Italy, on June 25, 2020 there are 239,821 total cases of which 33,592 deaths nationwide. Three lessons emerged from this experience that can serve as a blueprint to improve future plans for the outbreak of viruses. First, early reports on the spread of COVID-19 can help inform public health officials and medical practitioners in effort to combat its progression; second, inadequate risk assessment related to the urgency of the situation and limited reporting to the virus has led the rapid spread of COVID-19; third, an effective response to the virus had to be undertaken with coherent system of actions and simultaneously.


Author(s):  
David Callaway ◽  
Jeff Runge ◽  
Lucia Mullen ◽  
Lisa Rentz ◽  
Kevin Staley ◽  
...  

Abstract The United States Centers for Disease Control and Prevention and the World Health Organization broadly categorize mass gathering events as high risk for amplification of coronavirus disease 2019 (COVID-19) spread in a community due to the nature of respiratory diseases and the transmission dynamics. However, various measures and modifications can be put in place to limit or reduce the risk of further spread of COVID-19 for the mass gathering. During this pandemic, the Johns Hopkins University Center for Health Security produced a risk assessment and mitigation tool for decision-makers to assess SARS-CoV-2 transmission risks that may arise as organizations and businesses hold mass gatherings or increase business operations: The JHU Operational Toolkit for Businesses Considering Reopening or Expanding Operations in COVID-19 (Toolkit). This article describes the deployment of a data-informed, risk-reduction strategy that protects local communities, preserves local health-care capacity, and supports democratic processes through the safe execution of the Republican National Convention in Charlotte, North Carolina. The successful use of the Toolkit and the lessons learned from this experience are applicable in a wide range of public health settings, including school reopening, expansion of public services, and even resumption of health-care delivery.


2014 ◽  
Vol 24 (1) ◽  
pp. 213-225 ◽  
Author(s):  
Piotr Szwed ◽  
Paweł Skrzyński

Abstract For contemporary software systems, security is considered to be a key quality factor and the analysis of IT security risk becomes an indispensable stage during software deployment. However, performing risk assessment according to methodologies and standards issued for the public sector or large institutions can be too costly and time consuming. Current business practice tends to circumvent risk assessment by defining sets of standard safeguards and applying them to all developed systems. This leads to a substantial gap: threats are not re-evaluated for particular systems and the selection of security functions is not based on risk models. This paper discusses a new lightweight risk assessment method aimed at filling this gap. In this proposal, Fuzzy Cognitive Maps (FCMs) are used to capture dependencies between assets, and FCM-based reasoning is performed to calculate risks. An application of the method is studied using an example of an e-health system providing remote telemonitoring, data storage and teleconsultation services. Lessons learned indicate that the proposed method is an efficient and low-cost approach, giving instantaneous feedback and enabling reasoning on the effectiveness of the security system.


2015 ◽  
Vol 14 (4) ◽  
pp. 387-410 ◽  
Author(s):  
Ann De Keuckelaere ◽  
Liesbeth Jacxsens ◽  
Philip Amoah ◽  
Gertjan Medema ◽  
Peter McClure ◽  
...  

Systems ◽  
2021 ◽  
Vol 9 (4) ◽  
pp. 80
Author(s):  
Marianna Kalogeraki ◽  
Fani Antoniou

Managing the transportation of dangerous goods (DG) through road tunnels is of great importance since it is associated with a serious risk of accidents. The consequences of an accident involving DG, especially in the closed tunnel environment, might be more significant and even more catastrophic compared to the same accident occurring on an open road. This article presents the Greek experience regarding the application of quantitative risk assessment (QRA) methods for the transportation of DG through Greek road tunnels. The modified Delphi method, with the participation of nine experts, is employed to investigate the obstacles to successfully conforming with the mandatory European Union regulatory framework that applies to transport operations within the Trans-European road network. Recommendations are made to improve the applied QRA approach, to facilitate the cooperation between tunnel managers and emergency services, to communicate lessons learned and to enhance the training of risk assessors.


2020 ◽  
Vol 2 (10) ◽  
pp. 158-168
Author(s):  
Svitlana Shevchenko ◽  
Yuliia Zhdanovа ◽  
Svitlana Spasiteleva ◽  
Pavlo Skladannyi

This article examines the problem of implementing active teaching methods for students majoring in 125 Cybersecurity. The study of qualitative analysis of information security risks (IS) is presented on the example of studying the discipline "Risk Theory", namely the use of SWOT-analysis tools for risk assessment in the field of IS of small and medium business. General relevance and possibilities of using SWOT-analysis in the field of IS risk to study the internal environment of the organization, its strengths and weaknesses with the definition of enterprise strategies in the external environment: confronting threats to secure information (confidentiality, availability and integrity), and other its development. Based on scientific sources, the main research of the definition is analyzed: IS risks, risk analysis and their quality assessment. The content and procedure of SWOT-analysis are described. Using forms of group work and active methods (trainings) in the educational process, the basic factors for SWOT-analysis of the virtual organization "Internet Provider" were created, methodical expert assessments were conducted to identify the primary features of these factors, the analysis of the results was obtained.It is proved that the introduction of this technology in the educational process promotes the development of theoretical knowledge and the formation and development of practical skills of future specialists in information and cyber security


Sign in / Sign up

Export Citation Format

Share Document