Spelling suggestions: "subject:"critical infrastructure"" "subject:"crritical infrastructure""
31 |
La transformation du sytème bancaire dans l'Union européenne : une approche en terme de réseaux / Transformation of the banking system in the european Union : a network approachMirchev, Lyubomir 05 November 2013 (has links)
Ces dernières années, l’intégration des marchés financiers s’est accrue dans le monde entier. Ces marchés dépassent désormais les frontières nationales. A l’ordre du jour, la création d’instruments financiers adéquats et une démarche nouvelle, destinée à améliorer la sécurité et la stabilité du secteur financier de l’UE. L’objet de cette thèse est d’appréhender les principaux problèmes posés par la constitution et le développement du marché bancaire européen, et d’identifier les défis engendrés par les nouvelles réalités qui lui sont associées. Ce travail examine la transformation du marché bancaire européen, impacté par la crise, en mettant l’accent sur sa fonction de coordination dans l’économie. L’objectif de la thèse est d’analyser la transformation du système bancaire, d’une structure à effets différés, - c’est à dire telle que les mesures de régulation et les interventions en réponse à un problème sont différées dans le temps -, en un système opérationnel d’autorégulation fonctionnant en temps réel. Cette transformation améliorerait radicalement la stabilité et l’efficacité du système dans son ensemble. Cet objectif général conduit aux étapes suivantes : analyser le marché bancaire à travers une analyse du réseau pour mettre en évidence certaines spécificités des liens institutionnels, et contribuer ainsi à l’analyse de la transformation du secteur bancaire ; identifier les architectures de régulation et de contrôle du système bancaire pour mieux identifier sa structure actuelle de gestion et de contrôle ; appréhender le système bancaire comme une infrastructure critique relevant d’une approche en termes de réseau, et analyser ses propriétés de stabilité et d’efficacité dans le domaine financier (bancaire), d’un point de vue national et international. L’apport principal de la thèse est de fournir un modèle de surveillance en termes de réseaux, ce qui constitue un nouveau type d’architecture de contrôle du réseau financier. Ce modèle fournit une alternative aux modèles de contrôle actuels, dans l’objectif d’appréhender la structure contemporaine des marchés financiers. / In recent years, financial markets worldwide became highly integrated, overcoming national borders. The problem of developing adequate tools and comprehensive approaches for achieving higher security and stability in the EU financial sector is on the agenda. Key issues and challenges for the formation and development of the single European financial market, driven by the new realities, are considered in this thesis. The goal of this thesis is to propose and develop analyses able to contribute to the transformation of the banking system from a structure with delayed-in-time management, in which the impact of the regulatory measures and interventions in response to a particular problem is delayed in the time, into an operational self-regulating system (system of systems) operating in near real-time. This transformation would allow sharp increase in stability and operability of the system. The so defined goal implies the following more specific objectives: to analyze the banking market through the network perspective in order to reveal some aspects of the system, not typical to the particular institutions, regarded as separate entities; to analyze the regulatory and supervisory architectures for discovering the current control structure of the banking system; to explore and develop the architecture of the banking system as a separate critical infrastructure, which could enable the application of network-centric approach as an opportunity for achieving stability and efficiency (operability) in the financial sector, directly related to national and international security. The main proposition of the thesis is the creation of a new type of network supervisory architecture as an alternative to the current supervisory models in order to respond to the modern structure of the financial markets.
|
32 |
A Proactive Risk-Aware Robotic Sensor Network for Critical Infrastructure ProtectionMcCausland, Jamieson January 2014 (has links)
In this thesis a Proactive Risk-Aware Robotic Sensor Network (RSN) is proposed for the application of Critical Infrastructure Protection (CIP). Each robotic member of the RSN is granted a perception of risk by means of a Risk Management Framework (RMF). A fuzzy-risk model is used to extract distress-based risk features and potential intrusion-based risk features for CIP. Detected high-risk events invoke a fuzzy-auction Multi-Robot Task Allocation (MRTA) algorithm to create a response group for each detected risk. Through Evolutionary Multi-Objective (EMO) optimization, a Pareto set of optimal robot configurations for a response group will be generated using the Non-Dominating Sorting Genetic Algorithm II (NSGA-II). The optimization objectives are to maximize sensor coverage of essential spatial regions and minimize the amount of energy exerted by the response group. A set of non-dominated solutions are produced from EMO optimization for a decision maker to select a single response. The RSN response group will re-organize based on the specifications of the selected response.
|
33 |
Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost / A concept of monitoring critical information infrastructure for energetic companyŠevčík, Michal January 2018 (has links)
Diploma thesis deals with monitoring critical infrastructure, critical information infrastructure and network monitoring in energetic industry. The goal is to create analytical environment for processing logs from the network, to map the most critical segments of the network and implementation of monitoring and network devices, that increase security and mitigate risks of security events or security incidents
|
34 |
Roof Material Suitability for IT Mission-Critical FacilitiesPetrinovich, Charles Akira 04 June 2020 (has links)
Mission-critical facilities house operations that when interrupted, can prove disastrous to an organization’s future. Limited market research is available to determine what roof types are best suited to meet the unique demands of these buildings. The purpose of this research was to evaluate different roof materials and to observe trends relative to their lifecycle costs and roof professional’s assessment in use with mission-critical facilities. The objectives of the study were to determine the average annual lifecycle costs for the sampled roof materials, to determine the roofing professionals’ preferred mission-critical facility roof materials, and to priority rank the sampled roof materials for use with mission-critical facilities A pilot study was conducted to assess variables in evaluating different roof materials and their use with mission-critical facilities. Additionally, a survey was administered to roofing professionals across the United States to obtain lifecycle cost information for various roof materials as well as ratings for those materials for use with mission-critical facilities. The research found that single-ply roofs, with the exception of 60 Mil TPO, had lower annual lifecycle costs than built-up roofs due to their having lower install and removal costs, as well as having increasing life expectancies over the years. The metal roof selection was also shown to have a low annual lifecycle cost due to having the longest estimated lifespan. Built-up and metal roofs were rated highest by roofing professionals for their use with mission-critical facilities, suggesting a prioritization of risk reduction versus cost savings. When the lifecycle cost data was applied to the roof material ratings, the data showed that built-up roofs presented themselves as good values for mission-critical facilities; however, 90 Mil EPDM and 24-gauge metal roofs could be considered as viable cost savings alternatives.
|
35 |
Vulnerability Analysis of Infrastructure SystemsLane, Sean Theodore 07 July 2020 (has links)
Complex cyber-physical systems have become fundamental to modern society by effectively providing critical services and improving efficiency in various domains. Unfortunately, as systems become more connected and more complex, they also can become more vulnerable and less robust. As a result, various failure modes become more common and easily triggered from both unanticipated and malicious perturbations. Research has been conducted in the area of vulnerability analysis for cyber-physical systems, to assist in locating these possible vulnerabilities before they can fail. I present two case studies on different forms of critical infrastructure systems to identify vulnerabilities and understand how external perturbations can affect them, namely UAV drone swarms and municipal water infrastructure.
|
36 |
On the Distribution of Inter-Arrival Times of 911 Emergency ResponseProcess EventsMoss, Blake Cameron 22 May 2020 (has links)
The 911 emergency response process is a core component of the emergency services critical infrastructure sector in the United States. Modeling and simulation of a complex stochastic system like the 911 response process enables policy makers and stakeholders to better understand, identify, and mitigate the impact of attacks/disasters affecting the 911 system. Modeling the 911 response process as a series of queue sub-systems will enable analysis into how CI failures impact the different phases of the 911 response process. Before such a model can be constructed, the probability distributions of the inter-arrivals of events into these various sub-systems needs to be identified. This research is a first effort into investigating the stochastic behavior of inter-arrival times of different events throughout the 911 response process. I use the methodology of input modeling, a statistical modeling approach, to determine whether the exponential distribution is an appropriate model for these inter-arrival times across a large dataset of historical 911 dispatch records.
|
37 |
Modélisation, analyse et optimisation de la résilience des infrastructures critiques interdépendantes / Modelling, analysis and optimization of interdependent critical infrastructures resilienceLiu, Xing 13 December 2017 (has links)
La résilience concerne une capacité importante d'un système à résister et à se remettre des événements perturbateurs. L'objectif de cette thèse est de construire un cadre d'analyse et d'optimisation de la résilience des infrastructures critiques interconnectées (ICIs). Dans ce travail, les contributions scientifiques originales comprennent: 1) une approche de modélisation générique pour décrire le comportement dynamique et les processus d'échec en cascade dans les ICIs. 2) basé sur le modèle proposé, une approche quantitative d'évaluation de la résilience de ICIs est développée, où les aspects d'atténuation et de récupération sont évalués; 3) afin de réduire le coût de calcul dans le cas de systèmes à grande échelle, trois méthodes Différentes échelle, trois méthodes différentes d'analyse de sensibilité globale (ANN estimation, ensemble-based, given-data estimation), sont mis en place pour identifier les paramètres de modèle les plus pertinents affectant la résilience du système, puis les performances de ces méthodes sont comparées;4) un modèle hiérarchique est développé pour caractériser les facteurs de stratégies d'amélioration de la résilience. Un problème d’optimisations multi-objectif est formulé et résolu par l'algorithme NSGA-II, afin de fournir un plan optimal pour l'amélioration de la résilience du système. Les méthodes proposées sont mises en œuvre dans les applications, par exemple, un réseau d'alimentation en gaz et un réseau électrique. / Resilience is the ability of a system to resist to and recover from disruptive events. The objective of this thesis is to build a framework of analysis and optimization of interconnected critical infrastructures (ICIs) resilience. In this work, the original scientific contributions include: 1) a generic modeling approach to describe the dynamic behavior and the physical cascading failure processes in ICIs.2) on the basis of the model, a quantitative resilience assessment approach for ICIs is proposed, where both the mitigation and recovery aspects of system resilience are evaluated; 3) in order to reduce the computational cost in the case of large-scale systems, three different global sensitivity analysis methods (ANN estimation, ensemblebased, give-data estimation) are implemented to identify the most relevant model parameters affecting the system resilience, and then the performance of these methods are compared; 4) a hierarchical model is developed to characterize the factors of resilience improvement strategies. A multi-objectives optimization problem is formulated and solved by NSGA-II algorithm, to provide the optimal plan for system resilience improvement. The methods proposed are implemented to applications, e.g., a gas supply network and an electrical power grid.
|
38 |
Development and Analysis of System and Human Architectures for Critical Infrastructure Vulnerability AssessmentHuff, Johnathon Deon 06 May 2017 (has links)
The need to secure critical infrastructure (CI) systems against attacks is a topic that has been discussed recently in literature. Many examples of attacks against CI exist, such as the physical attack on the Pacific Gas and Electric Metcalf substation in 2013 that caused millions of dollars in damage or the Stuxnet cyber-attack which was identified in 2010 that caused damage to Iran’s nuclear program and alerted the world to the existence of cyber weapons. As a result of these types of events in which vulnerabilities in CI are exploited, it is important to have a comprehensive systems approach for assessing the vulnerabilities in CI systems. This dissertation seeks to provide a method for engineers to use system and human architectures to perform vulnerability assessment (VA) and decision analysis to enable decision makers to make tradeoffs on how to use their resources to protect CI against attacks.There are several gaps in literature in how to use system and human architectures to perform VA to protect CI from damage. First, no method exists that uses a model based approach and human and system architectures to perform a comprehensive analysis of CI to develop decision analysis models to aid decision makers in determining the most effective use of security resources to secure their CI systems. It is important that such models be comprehensive by including industry standards, system and human architectures, attack scenarios, subject matter expert opinion and models for analysis to help decision makers determine the best security investments. Second, there is not an established method to develop detailed mathematical models from an operational activity diagram that represents an attack scenario. This is important because the translation from architecture to high fidelity models will enable CI asset owners to make tradeoffs on security resource use. Finally, there is no method to evaluate the role of humans in a CI VA based on human views of the system. This dissertation provides an approach to use human and system architectures to perform VA and decision analysis to fill these gaps.
|
39 |
Minimal Trusted Computing Base for Critical Infrastructure ProtectionVelagapalli, Arun 17 August 2013 (has links)
Critical infrastructures like oil & gas, power grids, water treatment facilities, domain name system (DNS) etc., are attractive targets for attackers — both due to the potential impact of attacks on such systems, and due to the enormous attack surface exposed by such systems. Unwarranted functionality in the form of accidental bugs or maliciously inserted hidden functionality in any component of a system could potentially be exploited by attackers to launch attacks on the system. As it is far from practical to root out undesired functionality in every component of a complex system, it is essential to develop security measures for protecting CI systems that rely only on the integrity of a small number of carefully constructed components, identified as the trusted computing base (TCB) for the system. The broad aim of this dissertation is to characterize elements of the TCB for critical infrastructure systems, and outline strategies to leverage the TCB to secure CI systems. A unified provider-middleman-consumer (PMC) view of systems was adopted to characterize systems as being constituted by providers of data, untrusted middlemen, and consumers of data. As the goal of proposed approach is to eliminate the need to trust most components of a system to be secured, most components of the system are considered to fall under the category of “untrusted middlemen.” From this perspective, the TCB for the system is a minimal set of trusted functionality required to verify that the tasks performed by the middle-men will not result in violation of the desired assurances. Specific systems that were investigated in this dissertation work to characterize the minimal TCB included the domain name system (DNS), dynamic DNS, and Supervisory Control and Data Acquisition (SCADA) systems that monitor/control various CI systems. For such systems, this dissertation provides a comprehensive functional specification of the TCB, and outlines security protocols that leverage the trust in TCB functionality to realize the desired assurances regarding the system.
|
40 |
Model-Centric Interdependent Critical Infrastructure System Recovery Analysis and MetricsRussell, Kevin Joseph 29 June 2016 (has links)
This dissertation defines and evaluates new operations management modeling concepts for use with interdependent critical infrastructure system reconfiguration and recovery analysis. The work combines concepts from Graph Trace Analysis (GTA), Object Oriented Analysis and Design (OOAandD), the Unified Modeling Language (UML) and Physical Network Modeling; and applies them to naval ship reduced manned Hull, Mechanical, Electrical and Damage Control (HMEandDC) system design and operation management. OOAandD problem decomposition is used to derive a natural solution structure that simplifies integration and uses mission priority and mission time constraint relationships to reduce the number of system states that must be evaluated to produce a practical solution. New concepts presented include the use of dependency components and automated system model traces to structure mission priority based recovery analysis and mission readiness measures that can be used for automating operations management analysis. New concepts for developing power and fluid system GTA loop flow analysis convergence measures and acceleration factors are also presented. / Ph. D.
|
Page generated in 0.1056 seconds