By Topic

Risk-based model for tracking complexity in system vulnerability analysis

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Priya Sarda ; Dept. of Syst. & Inf. Eng., Virginia Univ., Charlottesville, VA ; Lambert, J.H.

We describe a method for tracking model complexity in system vulnerability analysis. The method builds on the collection of risk scenarios describing known vulnerabilities of systems and system components. We introduce the concept of an interaction as a mapping between a risk scenario and one or more system components. An interaction is direct when the mapping is obvious. An interaction is indirect when the mapping can make use of nonobvious relationships among system components. Indirect interactions characterize the rippling effects of a risk scenario and are used to identify the nonobvious interdependencies. With the above foundation, the method extends traditional process control charts to track evolving knowledge of scenarios and systems. The charts signal the emergence of anomalous variation in emerging knowledge of system vulnerability. The method is applied iteratively to avoid situations of surprise in an emerging model (scenarios and systems) of system vulnerability. An application of the method is discussed

Published in:

Systems and Information Engineering Design Symposium, 2004. Proceedings of the 2004 IEEE

Date of Conference:

16-16 April 2004