z-logo
Premium
Security Level Identification and Secure Software Design of Safety Critical Embedded Systems: Methodologies and Process
Author(s) -
Mitra Raka
Publication year - 2017
Publication title -
incose international symposium
Language(s) - English
Resource type - Journals
ISSN - 2334-5837
DOI - 10.1002/j.2334-5837.2017.00429.x
Subject(s) - security testing , software security assurance , computer security , control system security , security controls , security information and event management , computer science , security engineering , security service , process (computing) , security through obscurity , instrumentation (computer programming) , identification (biology) , computer security model , risk analysis (engineering) , control (management) , systems engineering , cloud computing security , engineering , information security , business , operating system , cloud computing , botany , artificial intelligence , biology
This paper is concerned with the process and technological aspects of Instrumentation & Control System, I&C System security and provides an overview of the recommended design practices and assessment methods for security aspects of control and instrumentation system used in Safety Critical Environments. This paper describes out how Security Levels of I&C systems and components of Safety Critical Facilities can be assigned by system designers. This is akin to Safety Integrity Level, SIL levels assigned for safety issues. It presents ideas about the three different security aspects viz Target Security Level, Achieved Security Level and Capability Security Level. The paper explains how it can be incorporated in the Life Cycle of an I&C System. It also factors the Physical Security issues, use of Wiring Harnesses. It then discusses the Security Level Vectors, the associated Foundational Requirements and the Security Lifecycle Program of an I&C System

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here