• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

通过基于功能的图表和安全库对网络物理系统(CPS)进行可追溯的设计安全决策。

Traceable Security-by-Design Decisions for Cyber-Physical Systems (CPSs) by Means of Function-Based Diagrams and Security Libraries.

作者信息

Fluchs Sarah, Taştan Emre, Trumpf Tobias, Horch Alexander, Drath Rainer, Fay Alexander

机构信息

Institute of Automation, Helmut-Schmidt-University, 22043 Hamburg, Germany.

admeritia GmbH, 40764 Langenfeld (Rheinland), Germany.

出版信息

Sensors (Basel). 2023 Jun 13;23(12):5547. doi: 10.3390/s23125547.

DOI:10.3390/s23125547
PMID:37420712
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10301087/
Abstract

"Security by design" is the term for shifting cybersecurity considerations from a system's end users to its engineers. To reduce the end users' workload for addressing security during the systems operation phase, security decisions need to be made during engineering, and in a way that is traceable for third parties. However, engineers of cyber-physical systems (CPSs) or, more specifically, industrial control systems (ICSs) typically neither have the security expertise nor time for security engineering. The security-by-design decisions method presented in this work aims to enable them to identify, make, and substantiate security decisions autonomously. Core features of the method are a set of function-based diagrams as well as libraries of typical functions and their security parameters. The method, implemented as a software demonstrator, is validated in a case study with the specialist for safety-related automation solutions HIMA, and the results show that the method enables engineers to identify and make security decisions they may not have made (consciously) otherwise, and quickly and with little security expertise. The method is also well suited to make security-decision-making knowledge available to less experienced engineers. This means that with the security-by-design decisions method, more people can contribute to a CPS's security by design in less time.

摘要

“设计即安全”是指将网络安全考量从系统的终端用户转移至工程师。为了减轻终端用户在系统运行阶段处理安全问题的工作量,需要在工程阶段做出安全决策,并且要以一种可被第三方追溯的方式进行。然而,网络物理系统(CPS)的工程师,或者更具体地说,工业控制系统(ICS)的工程师,通常既没有安全专业知识,也没有时间进行安全工程。本文提出的设计即安全决策方法旨在使他们能够自主识别、做出并证实安全决策。该方法的核心特性包括一组基于功能的图表以及典型功能及其安全参数的库。该方法作为一个软件演示器得以实现,并在与安全相关自动化解决方案专家HIMA的案例研究中得到验证,结果表明该方法能使工程师识别并做出他们原本(可能无意识地)不会做出的安全决策,而且能在安全专业知识有限的情况下快速做出决策。该方法也非常适合将安全决策知识传授给经验较少的工程师。这意味着通过设计即安全决策方法,更多人能够在更短的时间内为CPS的设计安全做出贡献。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/3b59c2496063/sensors-23-05547-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/683996c9aa8d/sensors-23-05547-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/cffc4e9ad2a1/sensors-23-05547-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/594f732009de/sensors-23-05547-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/def22737c951/sensors-23-05547-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/a1ad8b25a533/sensors-23-05547-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/0fe6381358d1/sensors-23-05547-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/3b59c2496063/sensors-23-05547-g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/683996c9aa8d/sensors-23-05547-g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/cffc4e9ad2a1/sensors-23-05547-g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/594f732009de/sensors-23-05547-g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/def22737c951/sensors-23-05547-g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/a1ad8b25a533/sensors-23-05547-g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/0fe6381358d1/sensors-23-05547-g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/cc0c/10301087/3b59c2496063/sensors-23-05547-g007.jpg

相似文献

1
Traceable Security-by-Design Decisions for Cyber-Physical Systems (CPSs) by Means of Function-Based Diagrams and Security Libraries.通过基于功能的图表和安全库对网络物理系统(CPS)进行可追溯的设计安全决策。
Sensors (Basel). 2023 Jun 13;23(12):5547. doi: 10.3390/s23125547.
2
Trusted Operation of Cyber-Physical Processes Based on Assessment of the System's State and Operating Mode.基于系统状态和运行模式评估的网络物理过程可信运行。
Sensors (Basel). 2023 Feb 10;23(4):1996. doi: 10.3390/s23041996.
3
Security Control of Cyber-Physical Systems under Cyber Attacks: A Survey.网络攻击下信息物理系统的安全控制:综述
Sensors (Basel). 2024 Jun 13;24(12):3815. doi: 10.3390/s24123815.
4
A Holistic Review of Cyber-Physical-Social Systems: New Directions and Opportunities.网络物理社会系统的全面综述:新方向与机遇
Sensors (Basel). 2023 Aug 24;23(17):7391. doi: 10.3390/s23177391.
5
Examining Cybersecurity of Cyberphysical Systems for Critical Infrastructures Through Work Domain Analysis.通过工作域分析检查关键基础设施的网络物理系统的网络安全。
Hum Factors. 2018 Aug;60(5):699-718. doi: 10.1177/0018720818769250. Epub 2018 Apr 17.
6
Resilience analysis of cyber-physical systems: A review of models and methods.网络物理系统的弹性分析:模型与方法综述
Risk Anal. 2023 Nov;43(11):2359-2379. doi: 10.1111/risa.14089. Epub 2023 Jan 16.
7
A Framework for Cybersecurity Requirements Management in the Automotive Domain.汽车领域网络安全需求管理框架。
Sensors (Basel). 2023 May 22;23(10):4979. doi: 10.3390/s23104979.
8
Hybrid Technique for Cyber-Physical Security in Cloud-Based Smart Industries.基于云的智能产业中的网络物理安全的混合技术。
Sensors (Basel). 2022 Jun 19;22(12):4630. doi: 10.3390/s22124630.
9
Cyber Risk Propagation and Optimal Selection of Cybersecurity Controls for Complex Cyberphysical Systems.网络风险传播与复杂网络物理系统的网络安全控制的最优选择
Sensors (Basel). 2021 Mar 1;21(5):1691. doi: 10.3390/s21051691.
10
Adversarial Risk Analysis to Allocate Optimal Defense Resources for Protecting Cyber-Physical Systems from Cyber Attacks.对抗性风险分析,为保护网络物理系统免受网络攻击分配最优防御资源。
Risk Anal. 2019 Dec;39(12):2766-2785. doi: 10.1111/risa.13382. Epub 2019 Jul 30.

本文引用的文献

1
Pictures, words, and sounds: from which format are we best able to reason?图片、文字和声音:我们最擅长从哪种形式进行推理?
J Gen Psychol. 2000 Oct;127(4):439-59. doi: 10.1080/00221300009598596.