SlideShare uma empresa Scribd logo
1 de 17
Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures Roberto Filippini, Marcelo Masera Institute of Protection and Security of Citizens Joint Research Centre, European Commission Ispra, Italy
Outline ,[object Object],[object Object],[object Object],[object Object]
Introduction Critical Infrastructures Assessment? Integration/Operation? Decision making?
Introduction Critical infrastructures  –  Networked – Systems of Systems  Service-oriented   -   available anytime, anywhere production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society
A Few Features of CI Layered structure Technical-organization-management Decision making Local versus global Failure pathologies Escalation - cascade Diverse metrics Diverse dynamics Cross - borders A pool of diverse branches or a new standalone discipline? Multi-disciplinary System of Systems Networked Service oriented Available anytime-anywhere production distribution information technology communications Society
Challenges ,[object Object],[object Object],? The single system  … Scope : internal dynamics with inputs from “outside” The system of systems Scope : Dependencies and Interdependencies
Challenges (2) ,[object Object],[object Object],Upper levels Scope : managements, business, legal, etc. Slower dynamics Lower levels Scope : physical processes, controls, services  Faster dynamics Field System Operation Corporate Inter-corporate Infrastructure x Field System Operation Corporate Inter-corporate Infrastructure y
Challenges (3) ,[object Object],[object Object],Field System Operation Corporate x Infrastructure Field System Operation Corporate y Inter-corporate Dependability Risk Business continuity Service Technical Business National  Cross-borders
Challenges (4) ,[object Object],[object Object],Recovery Failure Field System Operation Corporate Inter-corporate Infrastructure x Field System Operation Corporate Inter-corporate Infrastructure y Field System Operation Corporate Inter-corporate Infrastructure z
“ Building” Knowledge on CI ,[object Object],[object Object],[object Object],[object Object],Regulations Policies Procedures Controls Governance framework DATA Modeling Observing Reproducing
Priority Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],How CI reacts Metrics How CI fails
Modeling Insights 2 1 4 System 1 – Failure at system level 2 – Protection measures  3 – Local diagnostics 4 – Emergency management, cross-levels Field 3 Infrastructure TE  triggering event Service interruption Operation The failure scenario may affect several levels of the infrastructure
Modeling Insights (2) Local measures TE Triggering event End states of the infrastructure Emergency management propagation  throughout the network Local measures TE Triggering event Emergency management Restore End states of the system y Restore  End states of the system x Infrastructure x Infrastructure y TIME A failure propagates throughout the network and triggers other events
Modeling Insights (3) x1 x2 x3 y1 y2 System states may be more or less relevant depending on the perspectives System x System y 11 21 31 12 22 32 1) Compound states space : path independent 11 21 31 12 22 32 32 22 32 2) Compound states space:  path sensitive
Final Remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Final Remarks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Conclusions ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Destaque

Destaque (8)

Risk Management Methodology - Copy
Risk Management Methodology - CopyRisk Management Methodology - Copy
Risk Management Methodology - Copy
 
Risk Assessment Methodologies
Risk Assessment MethodologiesRisk Assessment Methodologies
Risk Assessment Methodologies
 
Risk Assessment And Management
Risk Assessment And ManagementRisk Assessment And Management
Risk Assessment And Management
 
Internal Control & Risk Management Framework
Internal Control & Risk Management FrameworkInternal Control & Risk Management Framework
Internal Control & Risk Management Framework
 
Risk & Risk Management
Risk & Risk ManagementRisk & Risk Management
Risk & Risk Management
 
Risk management
Risk managementRisk management
Risk management
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Risk Management Framework
Risk Management FrameworkRisk Management Framework
Risk Management Framework
 

Semelhante a Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real WorldMark Curphey
 
Complex Systems
Complex SystemsComplex Systems
Complex Systemseghafari
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberFrancis_McKinney
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Steve Ray
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementMel Drews
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensSirris
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network ControlSara Alvarez
 
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Shakas Technologies
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systemsmohammed alrekabe
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Shakeel Ali
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsUltraUploader
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial Systemiosrjce
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mindbmenden52
 
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...IJCNCJournal
 

Semelhante a Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures (20)

Software Security in the Real World
Software Security in the Real WorldSoftware Security in the Real World
Software Security in the Real World
 
Complex Systems
Complex SystemsComplex Systems
Complex Systems
 
Iet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th DecemberIet Prestige Lecture Coping With Complexity 7th December
Iet Prestige Lecture Coping With Complexity 7th December
 
Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...Next Generation Standards - A Science-Based Discipline of Information Managem...
Next Generation Standards - A Science-Based Discipline of Information Managem...
 
Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...Principles and risk assessment of managing distributed ontologies hosted by e...
Principles and risk assessment of managing distributed ontologies hosted by e...
 
Application Threat Modeling In Risk Management
Application Threat Modeling In Risk ManagementApplication Threat Modeling In Risk Management
Application Threat Modeling In Risk Management
 
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevensAstute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
Astute symposium 2013-10-10_hmi_design_patterns_elenatsiporkova_tomstevens
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Workshop8 18 12 09 Ingles
Workshop8   18 12 09 InglesWorkshop8   18 12 09 Ingles
Workshop8 18 12 09 Ingles
 
An Agent Future For Network Control
An Agent Future For Network ControlAn Agent Future For Network Control
An Agent Future For Network Control
 
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
Comparative Analysis of Intrusion Detection Systems and Machine Learning-Base...
 
communication in distributed systems
communication in distributed systemscommunication in distributed systems
communication in distributed systems
 
Only Abstract
Only AbstractOnly Abstract
Only Abstract
 
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
Critical Infrastructure Assessment Techniques to Prevent Threats and Vulnerab...
 
Abstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environmentsAbstraction based intrusion detection in distributed environments
Abstraction based intrusion detection in distributed environments
 
Information systems
Information systemsInformation systems
Information systems
 
Privacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial SystemPrivacy Protection in Distributed Industrial System
Privacy Protection in Distributed Industrial System
 
F017223742
F017223742F017223742
F017223742
 
Showcase Begin With The End In Mind
Showcase   Begin With The End In MindShowcase   Begin With The End In Mind
Showcase Begin With The End In Mind
 
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
ADDRESSING IMBALANCED CLASSES PROBLEM OF INTRUSION DETECTION SYSTEM USING WEI...
 

Mais de Global Risk Forum GRFDavos

Disaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyDisaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyGlobal Risk Forum GRFDavos
 
Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Global Risk Forum GRFDavos
 
Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global Risk Forum GRFDavos
 
Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Global Risk Forum GRFDavos
 
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Global Risk Forum GRFDavos
 
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...Global Risk Forum GRFDavos
 
C&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAC&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAGlobal Risk Forum GRFDavos
 
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Global Risk Forum GRFDavos
 
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Global Risk Forum GRFDavos
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Global Risk Forum GRFDavos
 
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...Global Risk Forum GRFDavos
 
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Risk Forum GRFDavos
 
Capacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDACapacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDAGlobal Risk Forum GRFDavos
 
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Global Risk Forum GRFDavos
 
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Global Risk Forum GRFDavos
 
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Global Risk Forum GRFDavos
 
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Global Risk Forum GRFDavos
 
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Global Risk Forum GRFDavos
 
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Global Risk Forum GRFDavos
 
A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...Global Risk Forum GRFDavos
 

Mais de Global Risk Forum GRFDavos (20)

Disaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian DohertyDisaster Risk Management Knowledge Centre, Brian Doherty
Disaster Risk Management Knowledge Centre, Brian Doherty
 
Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...Disaster risk reduction and nursing - human science research the view of surv...
Disaster risk reduction and nursing - human science research the view of surv...
 
Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...Global alliance of disaster research institutes (GADRI) discussion session, A...
Global alliance of disaster research institutes (GADRI) discussion session, A...
 
Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...Towards a safe, secure and sustainable energy supply the role of resilience i...
Towards a safe, secure and sustainable energy supply the role of resilience i...
 
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
Making Hard Choices An Analysis of Settlement Choices and Willingness to Retu...
 
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
The Relocation Challenges in Coastal Urban Centers Options and Limitations, A...
 
C&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLAC&A Save the Children Urban DRR Project, Ray KANCHARLA
C&A Save the Children Urban DRR Project, Ray KANCHARLA
 
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
Involving the Mining Sector in Achieving Land Degradation Neutrality, Simone ...
 
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...Disaster Risk Reduction and Nursing - Human Science research the view of surv...
Disaster Risk Reduction and Nursing - Human Science research the view of surv...
 
Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...Training and awareness raising in Critical Infrastructure Protection & Resili...
Training and awareness raising in Critical Infrastructure Protection & Resili...
 
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
IDRC Davos 2016 - Workshop Awareness Raising, Education and Training - Capaci...
 
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANOGlobal Alliance of Disaster Research Institutes - Hirokazu TATANO
Global Alliance of Disaster Research Institutes - Hirokazu TATANO
 
Capacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDACapacity Development for DRR, Beatrice PROGIDA
Capacity Development for DRR, Beatrice PROGIDA
 
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...Dynamic factors influencing the post-disaster resettlement success Lessons fr...
Dynamic factors influencing the post-disaster resettlement success Lessons fr...
 
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
Consequences of the Armed Conflict as a Stressor of Climate Change in Colombi...
 
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
Disaster Risk Perception in Cameroon and its Implications for the Rehabilitat...
 
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
Systematic Knowledge Sharing of Natural Hazard Damages in Public-private Part...
 
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
Exploring the Effectiveness of Humanitarian NGO-Private Sector Collaborations...
 
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
Can UK Water Service Providers Manage Risk and Resilience as Part of a Multi-...
 
A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...A Holistic Approach Towards International Disaster Resilient Architecture by ...
A Holistic Approach Towards International Disaster Resilient Architecture by ...
 

Último

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Último (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures

  • 1. Towards a methodology for a Quantitative (Risk) Assessment of Critical Infrastructures Roberto Filippini, Marcelo Masera Institute of Protection and Security of Citizens Joint Research Centre, European Commission Ispra, Italy
  • 2.
  • 3. Introduction Critical Infrastructures Assessment? Integration/Operation? Decision making?
  • 4. Introduction Critical infrastructures – Networked – Systems of Systems Service-oriented - available anytime, anywhere production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society production distribution information technology communications Control Monitoring Data Power supply INTERDEPENDENCIES Society
  • 5. A Few Features of CI Layered structure Technical-organization-management Decision making Local versus global Failure pathologies Escalation - cascade Diverse metrics Diverse dynamics Cross - borders A pool of diverse branches or a new standalone discipline? Multi-disciplinary System of Systems Networked Service oriented Available anytime-anywhere production distribution information technology communications Society
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12. Modeling Insights 2 1 4 System 1 – Failure at system level 2 – Protection measures 3 – Local diagnostics 4 – Emergency management, cross-levels Field 3 Infrastructure TE triggering event Service interruption Operation The failure scenario may affect several levels of the infrastructure
  • 13. Modeling Insights (2) Local measures TE Triggering event End states of the infrastructure Emergency management propagation throughout the network Local measures TE Triggering event Emergency management Restore End states of the system y Restore End states of the system x Infrastructure x Infrastructure y TIME A failure propagates throughout the network and triggers other events
  • 14. Modeling Insights (3) x1 x2 x3 y1 y2 System states may be more or less relevant depending on the perspectives System x System y 11 21 31 12 22 32 1) Compound states space : path independent 11 21 31 12 22 32 32 22 32 2) Compound states space: path sensitive
  • 15.
  • 16.
  • 17.

Notas do Editor

  1. 10/06/10 04:29 PM Page