The Proceedings of the International Conference on Nuclear Engineering (ICONE)
Online ISSN : 2424-2934
2023.30
Session ID : 1708
Conference information

USING THE INFORMATION HARM TRIANGLE TO MODEL SEQUENCES OF UNSAFE CONTROL ACTIONS IN INSTRUMENTATION AND CONTROL SYSTEMS
Lee T. MaccaroneAndrew S. HahnMichael T. Rowland
Author information
CONFERENCE PROCEEDINGS RESTRICTED ACCESS

Details
Abstract

The Information Harm Triangle (IHT) is an approach that seeks to simplify the defense-in-depth design of digital instrumentation and control (I&C) systems. The IHT provides a novel framework for understanding how cyber-attacks targeting digital I&C systems can harm the physical process. The utility of the IHT arises from the decomposition of cybersecurity analysis into two orthogonal vectors: data harm and physical information harm. Cyber-attacks on I&C systems can only directly cause data harm. Data harm is then transformed into physical information harm by unsafe control actions (UCAs) identified using Systems-Theoretic Process Analysis (STPA). Because data harm and physical information harm are orthogonal, defense-in-depth can be achieved by identifying control measures that independently limit data harm and physical information harm.

This paper furthers the development of the IHT by investigating the defense-in-depth design of cybersecurity measures for sequences of UCAs. The effects of the order and timing of UCAs are examined for several case studies to determine how to represent these sequences using the IHT. These considerations are important for the identification of data harm and physical information harm security measures, and they influence the selection of efficient measures to achieve defense-in-depth. This research enables the benefits of the IHT’s simple approach to be realized for increasingly complex cyber-attack scenarios.

Content from these authors
© 2023 The Japan Society of Mechanical Engineers
Previous article Next article
feedback
Top