Towards Reconciling Safety and Security Risk Analysis Processes in Railway Remote Driving

Author(s):  
Sadek Rayan Aktouche ◽  
Mohamed Sallak ◽  
Abdelmadjid Bouabdallah ◽  
Walter Schon
2021 ◽  
Vol 1077 (1) ◽  
pp. 012002
Author(s):  
Edri Yunizal ◽  
Judhi Santoso ◽  
Kridanto Surendro
Keyword(s):  

Author(s):  
Jaya Bhattacharjee ◽  
Anirban Sengupta ◽  
Mridul Sankar Barik ◽  
Chandan Mazumdar

An enterprise is characterized by its business processes and supporting ICT infrastructure. Securing these entities is of utmost importance for the survival of an enterprise and continuity of its business operations. In order to secure them, it is important to first detect the risks that can be realized to cause harm to those entities. Over the years, several kinds of security risk analysis methodologies have been proposed. They cater to different categories of enterprise entities and consider varying levels of detail during risk analysis. An enterprise often finds it difficult to select a particular method that will best suit its purpose. This paper attempts to address this problem by presenting a detailed study of existing risk analysis methodologies. The study classifies them into specific categories and performs comparative analyses considering different parameters addressed by the methodologies, including asset type, vulnerabilities, threats, and security controls.


Author(s):  
A. Di Febbraro ◽  
F. Papa ◽  
N. Sacco

The chapter is organized as follows: In section 1, the basic definitions of the security risk analysis and the characteristics of the railway security problem are introduced, and a bibliography review is reported. Then, in section 2, the general architecture for designing a security risk analysis tool is presented, focusing on the relevant specifications, and on the input/output characteristics. Therefore, in section 3, with the aim of pointing out the characteristics of the presented architecture, an explicative case study is defined based on real world data coming from Italian railways. Finally, some conclusions and remarks are discussed in chapter 4.


Author(s):  
Hamed H. Dadmarz

Risk analysis is required in all companies to help the business owners or top managers make decisions about risk management strategy, which itself provides an organization with a roadmap for information and information infrastructure protection aligned to business goals and the organization's risk profile. This chapter identifies information assets including network, electricity, hardware, service, software, and human resources in the ICT department of a health insurance company and their relevant risks. To determine the risks, the level of confidentiality, level of integrity, level of availability, the likelihood of threat occurrence, and intensity of vulnerability have been assessed and rated. Assessment is done based on the opinions of 30 experts in the field of information security. According to the results, the highest information security risk is on the network.


Author(s):  
Alyson G. Wilson ◽  
Kassandra M. Fronczyk

Sign in / Sign up

Export Citation Format

Share Document