Cybersecurity Safety
-
Upload
michigan-state-university-research -
Category
Internet
-
view
699 -
download
0
Transcript of Cybersecurity Safety
S oftwareE ngineering & N etwork
S ystems Lab
How Does Cybersecurity Relate to Safety?
Betty H.C. Cheng,
Software Engineering and Network Systems Lab Digital Evolution Laboratory
BEACON: NSF Center for Evolution in Action Department of Computer Science and Engineering Michigan State University
chengb at cse dot msu dot edu http://www.cse.msu.edu/~chengb
S oftwareE ngineering &N etworkS ystems Lab
IoT: Physical Cyberinfrastructure
•Network-
•Centric•Battlefi
eld•Homeland Security
•Ecosystem Monitoring
•Disaster
•Relief
•Secure Information Systems•Digital Supply
Chain• Remote• Safety-
critical• Real-time• Privacy• Adaptable• All the
above
• Wired•Internet
S oftwareE ngineering &N etworkS ystems Lab
New Scale: Internet of Things
Healthcare Infrastructure
•New scale:• Data stored, accessed, manipulated, and refined• Number of connections/interdependencies
among components• Number of hardware elements
•Ultra-Large-Scale Systems
•Linda Northrop, ICSE 2007•© 2007 Carnegie Mellon University
•20
Heterogeneous Collection of Distributed Systems
S oftwareE ngineering &N etworkS ystems Lab
Intelligent Transportation and Vehicle Systems
Ultra-Large Scale Systems
High-Assurance Cyberphysical Systems
•Ultra-Large-Scale Systems
•Linda Northrop, ICSE 2007•© 2007 Carnegie Mellon University
•21
•Requires increasingly complex systems• Thousands of platforms, sensors, decision nodes,
complex systems• Connected through heterogeneous wired and
wireless networks.
S E N S
ftware gineering & twork stems Lab
S oftwareE ngineering &N etworkS ystems Lab
The ULS/IoT Ecosystem
• Key elements:– Computing devices– Business and organizational policies– Environment (including people)
• Forces:–Competition for resources– Unexpected environmental changes– Decentralized control–Demand for assurance (safety and
security)
S oftwareE ngineering &N etworkS ystems Lab
• Key Cybersecurity Challenges:– Prevention– Detection– Mitigation
• Competing Concerns:• Safety• Information Access (e.g., “Internet of Things”)• Heterogeneity of Systems and Stakeholders
• Multi-Disciplinary Strategies:– Leverage enabling technologies from other
disciplines (e.g., biology, AI, control, cognitive & social science, etc.)
– Collaborate with other disciplines for a more holistic, systemic approach to address cybersecurity and safety.
6
Approach