Proactive Network Management of Mission Critical Systems

Author(s):  
Richard Tuggle
2018 ◽  
Author(s):  
Matthew Ridley ◽  
Carlos Otero ◽  
David Elliott ◽  
Xavier Merino

2018 ◽  
Author(s):  
Matthew Ridley ◽  
Carlos Otero ◽  
David Elliott ◽  
Xavier Merino

Author(s):  
В. Б. Бетелин ◽  
Д. А. Моргун

Происходящие в мире события свидетельствуют о возрастании угрозы перехвата управления системами с критической миссией (СКМ). Приводятся конкретные примеры инцидентов, один из них — массовые отключения электроэнергии в Венесуэле. Обосновывается необходимость разработки технологии создания цифровых систем управления, обеспечивающей парирование угрозы перехвата управления и нештатного функционирования систем с критической миссией. В основе этой технологии — концепция цифровых двойников объектов управления цифровых систем управления этими объектами, включая все аппаратные и программные компоненты, а также интеллектуальные средства самоконтроля и самокоррекции функционирования элементной базы, вычислительной и коммуникационной техники, базового и прикладного программного обеспечения. There is an ongoing threat of control interception in mission-critical systems (MCS). Specific examples of such incidents are presented, one of them is the massive power outages in Venezuela. We specify the reasons for creating an approach to developing digital control systems for MCS resistant to control interception and abnormal functioning. This technology is based on the digital twin concept. A twin represents all the hardware and software components, as includes smart tools for the hardware, core and application software self-monitoring and self-correction.  


Author(s):  
Maite Avelino ◽  
Francisco de la Torre

Author(s):  
Sergey Bratus ◽  
James Oakley ◽  
Ashwin Ramaswamy ◽  
Sean W. Smith ◽  
Michael E. Locasto

The mechanics of hot patching (the process of upgrading a program while it executes) remain understudied, even though it offers capabilities that act as practical benefits for both consumer and mission-critical systems. A reliable hot patching procedure would serve particularly well by reducing the downtime necessary for critical functionality or security upgrades. However, hot patching also carries the risk—real or perceived—of leaving the system in an inconsistent state, which leads many owners to forgo its benefits as too risky; for systems where availability is critical, this decision may result in leaving systems un-patched and vulnerable. In this paper, the authors present a novel method for hot patching ELF binaries that supports synchronized global data and code updates, and reasoning about the results of applying the hot patch. In this regard, the Patch Object format was developed to encode patches as a special type of ELF re-locatable object file. The authors then built a tool, Katana, which automatically creates these patch objects as a by-product of the standard source build process. Katana also allows an end-user to apply the Patch Objects to a running process.


2021 ◽  
pp. 41-57
Author(s):  
Gregory Falco ◽  
Eric Rosenbach

The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.


Sign in / Sign up

Export Citation Format

Share Document