Design and Implementation of a Threat-Specific Security Risk Assessment Tool

Author(s):  
Armstrong Nhlabatsi ◽  
Alaa Hussein ◽  
Noora Fetais ◽  
Khaled M. Khan
Author(s):  
Dimitris Zisiadis ◽  
George Thanos ◽  
Spyros Kopsidas ◽  
George Leventakis

Transportation networks are open and accessible, by design, and thus vulnerable to malicious attacks. Transportation networks are integral parts of larger systems, where individual transportation networks form a network-of-networks within a defined geographical region. A security incident on an asset can propagate to new security incidents in interconnected assets of the same or different networks, resulting in cascading failures in the overall network-of-networks. The present work introduces the STAR-TRANS Modeling Language (STML) and provides a reference implementation case. STML is a feature-rich, domain specific, high-level modeling language, capable of expressing the concepts and processes of the Strategic Risk Assessment and Contingency Planning in Interconnected Transportation Networks (STAR- TRANS) framework. STAR-TRANS is a comprehensive transportation security risk assessment framework for assessing related risks that provides cohered contingency management procedures for interconnected, interdependent and heterogeneous transport networks. STML has been used to produce the STAR-TRANS Impact Assessment Tool.


2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Robert Vrabel ◽  
Marcel Abas ◽  
Pavol Tanuska ◽  
Pavel Vazan ◽  
Michal Kebisek ◽  
...  

The goal of this paper is to provide a mathematical threat modeling methodology and a threat risk assessment tool that may assist security consultants at assessing the security risks in their protected systems/plants, nuclear power plants and stores of hazardous substances: explosive atmospheres and flammable and combustible gases and liquids, and so forth, and at building an appropriate risk mitigation policy. The probability of a penetration into the protected objects is estimated by combining the probability of the penetration by overcoming the security barriers with a vulnerability model. On the basis of the topographical placement of the protected objects, their security features, and the probability of the penetration, we propose a model of risk mitigation and effective decision making.


Sign in / Sign up

Export Citation Format

Share Document