Skip to main content

Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case

  • Conference paper
New Results in Dependability and Computer Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 224))

Abstract

The chapter presents information about the first stage of validation of the OSCAD tool for the risk reduction assessment within the decision support process. First, general information about risk management and risk assessment is given, and relations of the risk assessment with the flood issue are described. Basic information about the ValueSec project and its relations with risk assessment is presented. Next, the results of first experiments heading for OSCAD usage as one of the possible elements supporting the Risk Reduction Assessment (RRA) software pillar in the ValueSec project are described. The possibility of OSCAD usage for the RRA pillar was validated on the example of the so-called “flood use case” of the ValueSec project. This use case relates to the assessment and selection of flood countermeasures. The main objective of the validation is to find out if the risk assessment method implemented in OSCAD can be used for the flood issue.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ISO 31000:2009 – Risk management - Principles and guidelines

    Google Scholar 

  2. ISO/IEC 31010:2009 – Risk management - Risk assessment techniques

    Google Scholar 

  3. ISO/IEC 27005:2008 – Information technology - Security techniques - Information security risk management

    Google Scholar 

  4. BS OHSAS 18001:2007 – British Standard for occupational health and safety management systems – Requirements

    Google Scholar 

  5. Directive 2007/60/EC of the European Parliament and of the Council of 23 October 2007 on the assessment and management of flood risks

    Google Scholar 

  6. http://www.sepa.org.uk

  7. Flood Risk Management Planning in Scotland: Arrangements for 2012 - 2016, www.sepa.org.uk/flooding/flood_risk_management/national_flood_risk_assessment.aspx

  8. isok.imgw.pl (accessed January 18, 2013)

    Google Scholar 

  9. Raport z wykonania wstępnej oceny ryzyka powodziowego. IMGW PIB. W konsultacji z Krajowym Zarządem Gospodarki Wodnej (2011), http://www.kzgw.gov.pl/files/file/Materialy_i_Informacje/WORP/Raport.pdf (accessed January 18, 2013)

  10. Białas, A.: Risk assessment aspects in mastering the value function of security measures. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) New Results in Dependability & Comput. Syst. AISC, vol. 224, pp. 25–39. Springer, Heidelberg (2013)

    Google Scholar 

  11. ValueSec Project, http://www.valuesec.eu (accessed January 10, 2012)

  12. Institute EMAG, Reports of a specific-targeted project “Computer-supported business continuity management system – OSCAD” (2010-2012)

    Google Scholar 

  13. BS 25999-2:2007 Business Continuity Management – Specification for Business Continuity Management

    Google Scholar 

  14. ISO/IEC 27001:2005 – Information technology – Security techniques – Information security management systems – Requirements

    Google Scholar 

  15. Bagiński, J., Rostański, M.: The modeling of Business Impact Analysis for the loss of integrity, confidentiality and availability in business processes and data. Theoretical and Applied Informatics 23(1), 73–82 (2011) ISSN 1896-5334

    Google Scholar 

  16. Baginski, J., Białas, A.: Validation of the software supporting information security and business continuity management processes. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Complex Systems and Dependability. AISC, vol. 170, pp. 1–17. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  17. Bialas, A.: Computer support in business continuity and information security management. In: Kapczyński, A., Tkacz, E., Rostanski, M. (eds.) Internet - Technical Developments and Applications 2. AISC, vol. 118, pp. 155–169. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  18. Białas, A.: Bezpieczeństwo informacji i usług w nowoczesnej instytucji i firmie. WNT Publishing House, Warsaw (2006)

    Google Scholar 

  19. Białas, A.: Development of an Integrated, Risk-Based Platform for Information and E-Services Security. In: Górski, J. (ed.) SAFECOMP 2006. LNCS, vol. 4166, pp. 316–329. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  20. Białas, A., Lisek, K.: Integrated, business-oriented, two stage risk analysis. Journal of Information Assurance and Security 2(3) (September 2007) ISSN 1554-10

    Google Scholar 

  21. Białas, A., Cała, D., Napierała, J.: Wspomaganie zarządzania ciągłością działania zakładu górniczego za pomocą system OSCAD. Mechanizacja i Automatyzacja Górnictwa, Czasopismo Naukowo – Techniczne 7(497), 11–25 (2012)

    Google Scholar 

  22. Białas, A.: Security Trade-off – Ontological Approach. In: Akbar Hussain, D.M. (ed.) Advances in Computer Science and IT, pp. 39–64. In-Tech, Vienna-Austria (2009) ISBN 978-953-7619-51-0, http://sciyo.com/articles/show/title/security-trade-off-ontological-approach?PHPSESSID=kkl5c72nt1g3qc4t98de5shhc2

    Google Scholar 

  23. Bialas, A.: Ontological Approach to the Business Continuity Management System Development. In: Arabnia, H., Daimi, K., Grimaila, M.R., Markowsky, G. (eds.) Proceedings of the 2010 International Conference on Security and Management, The World Congress In Applied Computing – SAM 2010, Las Vegas, USA, July 12-15, vol. II, pp. 386–392. CSREA Press (2010) ISBN: 1-60132-159-7, 1-60132-162-7 (1-60132-163-5)

    Google Scholar 

  24. Bialas, A.: Common Criteria Related Security Design Patterns for Intelligent Sensors—Knowledge Engineering-Based Implementation. Sensors 11, 8085–8114 (2011), http://www.mdpi.com/1424-8220/11/8/8085/

    Article  Google Scholar 

  25. Rogowski, D., Nowak, P.: Pattern based support for site certification. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds.) Complex Systems and Dependability. AISC, vol. 170, pp. 179–193. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jacek Bagiński .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Bagiński, J. (2013). Software Support of the Risk Reduction Assessment in the ValueSec Project Flood Use Case. In: Zamojski, W., Mazurkiewicz, J., Sugier, J., Walkowiak, T., Kacprzyk, J. (eds) New Results in Dependability and Computer Systems. Advances in Intelligent Systems and Computing, vol 224. Springer, Heidelberg. https://doi.org/10.1007/978-3-319-00945-2_2

Download citation

Publish with us

Policies and ethics