Skip to main content

Security Assessments of Safety Critical Systems Using HAZOPs

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2187))

Abstract

Concerned with serious problems regarding security as a safety issue, a HAZOP specifically suited for identifying security threats has been developed. Unfortunately, the emphasis placed on security issues when developing safety critical systems is to often inadequate, possibly due to the lack of “;safety-compliant” security methods. Having had the opportunity to adapt the HAZOP-principle to the security context, a HAZOP was established which is well-suited for handling security issues in a safety context. Indeed, since the main modification of the method consists of establishing new guidewords and attributes, it is quite possible to handle security issues as part of the traditional hazard analysis. In addition, while presenting the modified HAZOP-method, its use on safety related systems will be demonstrated.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Chemical Industries Association: A guide to Hazard and Operability Studies (1992).

    Google Scholar 

  2. Chudleigh M.F., Catmur J.R.: Safety Assessment of Computer Systems Using HAZOP and Audit Techniques. Proceedings of Safety of Computer Control Systems, SAFECOMP (1992). Pergamon Press

    Google Scholar 

  3. CORAS IST-2000-25031: A Platform for Risk Analysis of Security Critical Systems. http://www.nr.no/coras.

  4. Dahll, G.: Safety Evaluation of a Train Leader Telephone System. Proceedings of Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP (1999). Springer-Verlag.

    Google Scholar 

  5. Laprie J.-C. (Ed.),: Dependability: Basic Concepts and Terminology. IFIP WG 10.4 Dependable Computing and Fault Tolerance, vol. 5. Springer-Verlag (1992).

    Google Scholar 

  6. Ministry of Defence: Interim Defence Standard 00-58/1: Hazop Studies on Systems Containing Programmable Electronics. Directorate of Standardization (1994).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Winther, R., Johnsen, OA., Gran, B.A. (2001). Security Assessments of Safety Critical Systems Using HAZOPs. In: Voges, U. (eds) Computer Safety, Reliability and Security. SAFECOMP 2001. Lecture Notes in Computer Science, vol 2187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45416-0_2

Download citation

  • DOI: https://doi.org/10.1007/3-540-45416-0_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42607-3

  • Online ISBN: 978-3-540-45416-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics