A Comparative Risk Analysis on CyberShip System with STPA-Sec, STRIDE and CORAS
Authors:
Rishikesh Sahay,
D. A. Sepulveda Estay,
Weizhi Meng,
Christian D. Jensen,
Michael Bruhn Barfod
Abstract:
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have bee…
▽ More
The widespread use of software-intensive cyber systems in critical infrastructures such as ships (CyberShips) has brought huge benefits, yet it has also opened new avenues for cyber attacks to potentially disrupt operations. Cyber risk assessment plays a vital role in identifying cyber threats and vulnerabilities that can be exploited to compromise cyber systems. A number of methodologies have been proposed to carry out these analyses. This paper evaluates and compares the application of three risk assessment methodologies: system theoretic process analysis (STPA-Sec), STRIDE and CORAS for identifying threats and vulnerabilities in a CyberShip system. We specifically selected these three methodologies because they identify threats not only at the component level, but also threats or hazards caused due to the interaction between components, resulting in sets of threats identified with each methodology and relevant differences. Moreover, STPA-Sec which is a variant of the STPA is widely used for safety and security analysis of cyber physical systems (CPS); CORAS offers a framework to perform cyber risk assessment in a top-down approach that aligns with STPA-Sec; and STRIDE (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service, Elevation of Privilege) considers threat at the component level as well as during the interaction that is similar to STPA-Sec. As a result of this analysis, this paper highlights the pros and cons of these methodologies, illustrates areas of special applicability, and suggests that their complementary use as threats identified through STRIDE can be used as an input to CORAS and STPA-Sec to make these methods more structured.
△ Less
Submitted 21 December, 2022;
originally announced December 2022.
Simulating feedback mechanisms in patient flow and return visits in an emergency department
Authors:
Christian Michel Sørup,
Daniel Alberto Sepúlveda Estay,
Peter Jacobsen,
Philip Dean Anderson
Abstract:
Emergency department (ED) crowding has been an increasing problem worldwide. Prior research has identified factors that contribute to ED crowding. However, the relationships between these remain incompletely understood. This study's objective was to analyse the effects of initiating a local protocol to alleviate crowding situations at the expense of increasing returning patients through the develo…
▽ More
Emergency department (ED) crowding has been an increasing problem worldwide. Prior research has identified factors that contribute to ED crowding. However, the relationships between these remain incompletely understood. This study's objective was to analyse the effects of initiating a local protocol to alleviate crowding situations at the expense of increasing returning patients through the development of a system dynamics (SD) simulation model. The SD study is from an academic care hospital in Boston, MA. Data sources include direct observations, semi-structured interviews, archival data from October 2013, and peer-reviewed literature from the domains of emergency medicine and management science. The SD model shows interrelations between inpatient capacity restraints and return visits due to potential premature discharges. The model reflects the vulnerability of the ED system when exposed to unpredicted increases in demand. Default trigger values for the protocol are tested to determine a balance between increased patient flows and the number of returning patients. Baseline simulation runs for generic variables assessment showed high leverage potential in bed assignment- and transfer times.
A thorough understanding of the complex non-linear behaviour of causes and effects of ED crowding is enabled through the use of SD. The vulnerability of the system lies in the crucial interaction between the physical constraints and the expedited patient flows through protocol activation. This study is an example of how hospital managers can benefit from virtual scenario testing within a safe simulation environment to immediately visualise the impacts of policy adjustments.
△ Less
Submitted 18 March, 2019;
originally announced March 2019.