Vis enkel innførsel

dc.contributor.authorBernsmed, Karin
dc.contributor.authorFrøystad, Christian
dc.contributor.authorMeland, Per Håkon
dc.contributor.authorNesheim, Dag Atle
dc.contributor.authorRødseth, Ørnulf Jan
dc.date.accessioned2018-03-08T18:16:53Z
dc.date.available2018-03-08T18:16:53Z
dc.date.created2018-03-06T08:42:09Z
dc.date.issued2018-01-19
dc.identifier.citationLecture Notes in Computer Science. 2018, 10744 38-56.nb_NO
dc.identifier.issn0302-9743
dc.identifier.urihttp://hdl.handle.net/11250/2489600
dc.description.abstractSafety and security risks are usually analyzed independently, by different people using different tools. Consequently, the system analyst may fail to realize cyber attacks as a contributing factor to safety impacts or, on the contrary, design overly secure systems that will compromise the performance of critical operations. This paper presents a methodology for visualizing and assessing security risks by means of bow-tie diagrams, which are commonly used within safety assessments. We outline how malicious activities, random failures, security countermeasures and safety barriers can be visualized using a common graphical notation and propose a method for quantifying risks based on threat likelihood and consequence severity. The methodology is demonstrated using a case study from maritime communication. Our main conclusion is that adding security concepts to the bow-ties is a promising approach, since this is a notation that high-risk industries are already familiar with. However, their advantage as easy-to-grasp visual models should be maintained, hence complexity needs to be kept low.nb_NO
dc.language.isoengnb_NO
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/deed.no*
dc.subjectSecuritynb_NO
dc.subjectSafetynb_NO
dc.subjectRisk assessmentnb_NO
dc.subjectBow-tie diagramsnb_NO
dc.subjectMaritime communicationnb_NO
dc.titleVisualizing Cyber Security Risks with Bow-Tie Diagramsnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.rights.holderAccepted manuscript © the Authors 2018nb_NO
dc.source.pagenumber38-56nb_NO
dc.source.volume10744nb_NO
dc.source.journalLecture Notes in Computer Sciencenb_NO
dc.identifier.doi10.1007/978-3-319-74860-3_3
dc.identifier.cristin1570689
dc.relation.projectNorges forskningsråd: 256508nb_NO
cristin.unitcode7401,90,13,0
cristin.unitcode7566,7,0,0
cristin.unitnameSystemutvikling og sikkerhet
cristin.unitnameMaritim
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Attribution-NonCommercial-NoDerivatives 4.0 Internasjonal