Towards Interdependent Safety Security Assessments Using Bowties

Luca Arnaboldi*, David Aspinall

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

We present a way to combine security and safety assessments using Bowtie Diagrams. Bowties model both the causes leading up to a central failure event and consequences which arise from that event, as well as barriers which impede events. Bowties have previously been used separately for security and safety assessments, but we suggest that a unified treatment in a single model can elegantly capture safety-security interdependencies of several kinds. We showcase our approach with the example of the October 2021 Facebook DNS shutdown, examining the chains of events and the interplay between the security and safety barriers which caused the outage.
Original languageEnglish
Title of host publicationComputer Safety, Reliability, and Security. SAFECOMP 2022 Workshops
Subtitle of host publicationDECSoS, DepDevOps, SASSUR, SENSEI, USDAI, and WAISE Munich, Germany, September 6–9, 2022, Proceedings
EditorsMario Trapp, Erwin Schoitsch, Jérémie Guiochet, Friedemann Bitsch
Place of PublicationCham
PublisherSpringer
Pages211–229
Number of pages19
Edition1
ISBN (Electronic)9783031148620
ISBN (Print)9783031148613
DOIs
Publication statusPublished - 7 Sept 2022
EventThe 41st International Conference on Computer Safety, Reliability and Security - Munich, Germany
Duration: 6 Sept 20229 Sept 2022

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume13415
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceThe 41st International Conference on Computer Safety, Reliability and Security
Abbreviated titleSAFECOMP 2022
Country/TerritoryGermany
CityMunich
Period6/09/229/09/22

Keywords

  • Safety and security
  • Bowtie diagrams
  • Risk analysis

Fingerprint

Dive into the research topics of 'Towards Interdependent Safety Security Assessments Using Bowties'. Together they form a unique fingerprint.

Cite this