how does cybersecurity relate to safety?
TRANSCRIPT
S oftwareE ngineering &N etworkS ystems Lab
How Does Cybersecurity Relate to Safety?
Betty H.C. Cheng,
Software Engineering and Network Systems LabDigital Evolution Laboratory
BEACON: NSF Center for Evolution in ActionDepartment of Computer Science and Engineering
Michigan State Universitychengb at cse dot msu dot edu
http://www.cse.msu.edu/~chengb
S oftwareE ngineering &N etworkS ystems Lab
IoT: Physical Cyberinfrastructure
•Network-•Centric
•Battlefield•Homeland Security
•Ecosystem Monitoring
•Disaster •Relief
•Secure Information Systems•Digital Supply Chain
• Remote
• Safety-critical
• Real-time
• Privacy
• Adaptable
• All the above• Wired •Internet
S oftwareE ngineering &N etworkS ystems Lab
New Scale: Internet of Things
Healthcare Infrastructure
•20•Ultra-Large-Scale Systems•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
•New scale:• Data stored, accessed, manipulated, and refined• Number of connections/interdependencies among
components• Number of hardware elements
Heterogeneous Collection of Distributed Systems
S oftwareE ngineering &N etworkS ystems Lab
Intelligent Transportation and Vehicle Systems
•21•Ultra-Large-Scale Systems•Linda Northrop, ICSE 2007
•© 2007 Carnegie Mellon University
High-Assurance Cyberphysical Systems
•Requires increasingly complex systems• Thousands of platforms, sensors, decision nodes, complex
systems • Connected through heterogeneous wired and wireless
networks.
Ultra-Large Scale Systems
S oftwareE ngineering &N etworkS ystems Lab
S oftwareE ngineering &N etworkS ystems LabThe ULS/IoT Ecosystem
• Key elements:– Computing devices– Business and organizational policies– Environment (including people)
• Forces:– Competition for resources– Unexpected environmental changes– Decentralized control– Demand for assurance (safety and
security)
S oftwareE ngineering &N etworkS ystems Lab
Approach• Key Cybersecurity Challenges:
– Prevention– Detection– Mitigation
• Competing Concerns:• Safety• Information Access (e.g., “Internet of Things”) • Heterogeneity of Systems and Stakeholders
• Multi-Disciplinary Strategies:– Leverage enabling technologies from other disciplines
(e.g., biology, AI, control, cognitive & social science, etc.)– Collaborate with other disciplines for a more holistic,
systemic approach to address cybersecurity and safety. 6