F/Cfat : An Approach For Combined Safety And Security Analysis

1486 words - 6 pages

I. INTRODUCTION
System safety is a complex concept, which is represented by multiple attributes and which requires diverse sources of evidence to demonstrate its achievement. Safety-critical systems, which provide safety-critical services to their users, must be designed to be safe. This means that despite their complexities and despite variable environmental conditions, their operation should be demonstrably safety. A fundamental difficulty in measuring system safety arises due to the complexity of the notion – it is made up of multiple, potentially conflicting attributes, and difficult trade-offs may need to be made between these attributes. The attributes themselves are evaluated using multiple diverse sources of evidence, thus compounding the problem of measuring system safety.
Software safety has become an ever increasingly important issue in system safety due to the larger role software plays in complex cyber-physical systems. Such a system is a consisted of a number of components distributed over a predefined space. Components of a typical cyber-physical system communicate with each other and with an external world through communication gateway. The safety failures of the components of such a system result in safety hazard of the whole system. Additionally, external attackers can attack the system through sensor network and communication gateway and can manipulate software processes and data stored and exchanged in the system.
Over the last decades a good many number of safety analysis methods (i.e., FMEA, HAZOP, FTA) have been developed. Among them Fault Tree Analysis (FTA) [1] is a widely accepted method. It graphically shows how basic failures of components, in combination, cause a safety hazard at the system level. However, classical FTA lacks the precise semantics to check the correctness or consistency of the problem description [2]. In other words, classical FTA is based on the informal description of the underlying system, which makes it very difficult to check the description for correctness and consistency [2] [3].
In recent years a number of formal fault tree models have been developed [5] [6] [7] [4]. Most of these methods provide formal semantics for the fault tree constructs, such as different logic gates [5] [8]; and have not considered on the formal construction of the fault tree in a deductive manner. In these methods the formal model and the fault trees are developed as separate documents [7] [5] [6]. The safety analysts develop the fault trees by using their intuition, while the events and sub-events of a gate are formalized afterwards with respect to the formal model [8]. Although this approach is effective for quickly constructing fault trees, it results some problems when verifying its correctness [2]. In order to overcome these problems Xiang et. al. have proposed a formal fault tree analysis model based on propositional logic and state transition [4].
In this paper we would like to propose the extension the...

Find Another Essay On F/CFAT : An Approach for Combined Safety and Security Analysis

A Modified Approach for the Domain Name System Security

935 words - 4 pages due to hackers. It has become a risk to redirect the current page to any desired page, because one may be redirected to any unsafe page which may cause to lower the trust in security measures. So our objective is to develop such a system which provides more security while we are surfing on internet and make the path from source page to requested page more secure. This paper provides an idea through which we can overcome the disadvantages of

"Store and Forward: A Collaborative Approach for Developing Interactive Digital Media (IDM) for Classroom Instruction." An article review and summary

820 words - 3 pages , education is evolving and it is necessary to implement new technology. Interactive digital media is a way to not only incorporate technology into the classroom, but also a way for students to teach students. By a student developing an IDM, they are not only making a learning device for a peer, they are also reiterating the information into their own knowledge.Works Cited:Henke, Mitchell E., and Frank Latendresse. "Store and Forward: A Collaborative Approach for Developing Interactive Digital Media (IDM) for Classroom Instruction." The Technology Teacher (May 2005): 6-8.

An Analysis of Security Sector Reforms

1845 words - 8 pages capable of obtaining this reform; whether a country shall attempt the reform during war or post-war; and discovering the challenges and successes of the reform. To start off, each individual has an argument for the best way to go about reforming the security sector within transitional societies. As my own individual, I believe that it is best to build a military force that can uphold the laws and cultural beliefs of the people. Stated in John Moyibi

An Analytical Approach to Truth and Religion

6399 words - 26 pages An Analytical Approach to Truth and Religion ABSTRACT: I discuss some of the problems of the application of the notion of truth to religion. After introductory remarks on the problem called truth and religion to show the peculiarity and the actuality of the problem discussed, I examine the different meanings of the notions of truth and religion, in order to formulate some comments on the different concepts of the truth of religion. I name

(An Analysis of the Security Sector Reforms in Russia and Bulgaria)

1522 words - 7 pages National Peace Essay 2014 (An Analysis of the Security Sector Reforms in Russia and Bulgaria) Over the past twenty years, civilization has seen vast changes in which our society performs and operates. “Security sector is a broad term often used to describe the structures, institutions and personnel responsible for the management, provision and oversight of security in a country. These can include defense, law enforcement institutions

NFL Safety Development for Players and Officals

1013 words - 5 pages American football in the past several years have really developed, not only from the fans perspective but also from the players and the official heads. Safety is the most important topic talked about in all sports but it is a must in football, especially because of the way the game is played with all of the tackles and hits. It is really important not only for the players to be safe but also the officials to keep it safe. Both players and

Quality and Safety Education for Nurses

996 words - 4 pages account to determine if a hospital has a magnet status (McCaffrey et al., 2010). The quality and safety education for nurses (QSEN) according to the observations provided by Dolansky and Moore (2013), is mainly oriented to promote and implement optimal quality patient care that translate into competent nursing practices in the delivery of patient care. The quality and safety education for nursing (QSEN) that is going to be address in this paper

An Analysis of John F. Kennedy's Civil Rights Address

1776 words - 7 pages and demoralize America from within. It is 11 June, 1963, and the Alabama National Guardsmen are called to the University of Alabama to ensure the safe admission of two black students. That same afternoon, John F. Kennedy addresses the nation in an attempt to sooth flared tempers on both sides of the debate. Despite the limited time for preparation, “… it was one of his best speeches–a heartfelt appeal in behalf of a moral cause that included

An analysis of Security Management in an organization

9269 words - 37 pages is a list of hosts that support services that are exposed to attack.There are several publicly available tools, such as the Internet Security Scanner (ISS) or the Security Analysis Tool for Auditing Networks (SATAN), that scan an entire domain or sub network and look for security holes. These programs determine the weaknesses of each system with respect to several common system vulnerabilities. Intruders use the information collected from these

An Advanced Grammatical Evolution Approach for Intrusion Detection in Manet

1347 words - 6 pages . F. Lunt. Model based intrusion detection, in Proceedings of the 14th National Computer Security Conference, pp. 372-385, Oct. 1991. [5] Y. Zhang, W. Lee, and Y. an Huang. Intrusion detection techniques for mobile wireless networks. Wireless Networks Journal (ACM WINET), 2(5), September 2003. [6] R. Guha, O. Kachirski, D. Schwartz, S. Stoecklin, and E. Yilmaz. Case-based agents for packet-level intrusion detection in ad hoc networks. In

Selcting an Approach for a Qualitative Research Plan

597 words - 3 pages Selecting an Approach for a Qualitative Research Plan Creswell (2013) contends that “we need to identify our approach to qualitative inquiry in order to present it as a sophisticated study, to offer it as a specific type so that reviewers can properly assess it, and…to offer some way of organizing ideas that can be grounded in the scholarly literature of qualitative research” (p. 69). Although I believe all three arguments cited by the author

Similar Essays

Safety And Security In Joining Online Casinos

812 words - 3 pages More and more people around the world are now enjoying their own time spent in online casinos. However, a great number of people may not yet fully trust online gaming because of safety and security reasons. The steps in joining any online casinos may be very easy but people would like to be assured that they are dealing with legitimate providers. People who would like to try online casinos may take note of the following important things that

Workplace Health And Safety Act 1995, And Employee And Employer Obligations, Includes An Analysis Of..... Woolworths Safety Act

1274 words - 5 pages -operate with employers in helping maintain health and safety at work.As well as employers, and employees, Work cover is also responsible for safety in the workplace. They carry out regular checks in the workplace to make sure that the Occupational Health and Safety act is being followed and that hazards are kept to a minimum.Identifying hazards in an office environmentIt is important to be aware that hazards exist in any workplace and one should

An Analysis Of Cell Phone Technology, Security, And Individual Rights

1056 words - 4 pages An Analysis of Cell Phone Technology, Security, and Individual Rights In this technology driven era, I question what effect cell phones are having on our lives as American citizens? To investigate this, I read two articles. The first reading was “Mobile Phone Tracking Scrutinized” by Nikki Swartz originally published in the Information Management Journal for March/April 2006, and the second reading was “Reach out and Track Someone” by Terry

Occupational Safety And Health's Spearhead Approach Ot Workplace Violence

2053 words - 9 pages understanding of who is involved in WPV categories is essential for the construction of a plan, an effective response to the incident and recovery. It is not a ‘’one size fits all approach’’. In Emergency Management, Occupational Safety and Health and the security professions there are four categories of WPV that are recognized (12). They are: TYPE 1: These are violent acts committed by an individual who has no connection to the workplace. An example