[SystemSafety] Safety and effective or not cybersecurity countermeasures (was: IEC 63069, and Cybersecurity in IEC 61508)

Brent Kimberley brent_kimberley at rogers.com
Wed Jun 5 23:24:44 CEST 2019


 Tail-waging-dogI would reset my Frame of Reference/origin, and ask how organic systems do it in practice.That fact that organic systems are largely immune speaks volumes.    On Wednesday, June 5, 2019, 02:24:06 a.m. EDT, David MENTRÉ <David.MENTRE at bentobako.org> wrote:  
 
 Hello,

Le 05/06/2019 à 00:34, Brent Kimberley a écrit :
> >> How would you produce a safe device without assuming effective
> cybersecurity countermeasures make it immune to such network attacks?
> Resiliency: Design the system such that it can fail safe / detect /
> tolerate internal failure?  
>
> Concept such as Cyber-Parkinson's / remedial action / dynamic failure
> effect minimization / self-heaing aren't new.

I'm not against those concepts but how to do that in practice?

Typically, if the device can detect cyberattacks, it is because the
cybersecurity countermeasure is effective. If the device can tolerate
the attack, it is because the cybersecurity countermeasure is also
effective to circumvent it to a specific perimeter.

In my example, how would you design the system to avoid unsafe effects
of software overwrite?

Best regards,
D. Mentré


  
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.techfak.uni-bielefeld.de/mailman/private/systemsafety/attachments/20190605/a5b24781/attachment-0001.html>


More information about the systemsafety mailing list