2.5 Summary and Further Reading (including Information on Seminar Exercises)

6. 2.5 Summary and Further Reading (including Information on Seminar Exercises)

Watch

1. A summary of the material in part 2, some pointers on further reading and information on the seminar exercises.

2. The part 2 safety and security videos from our industrial partners in the module with Copyrighted Material.

Read

Elective

Mandatory

Do

1. For the first part of the seminar day:

  • (Possibly together with others) Study the framework given to you, and put together a 25-minute presentation, emphasising:
    • What is the history of the framework (who put it together and why)?
    • How does the framework relate to the 4+1 principles of assurance?
    • Is it implicit or explicit?
    • What are its special characteristics in comparison to other frameworks?

You hand in the presentation here in a PPTx format, with what you aim to say during the presentation in the notes to each slide. 

2. For the second part of the seminar day:

  • Read through scenario description.
  • Identify a likely threat source that would be interested in retrieving contraband before inspections (unnoticed).
  • Identify and detail an attack through which the threat source could succeed with this.
  • Identify how you might deter, detect, delay, respond or recover from the attack.
  • Identify which hazards are affected by the tampering with the system, and how.
  • Suggest the most important redesign of the system in your mind.
  • Prepare a short presentation to argue for this redesign, considering (for instance):
    • What is a plausible chain of events that the redesign would influence?
    • Is it primarily motivated by security or safety?
    • Does it support deterring, detecting, delaying, responding or recovering from an attack?
    • Does it remove a hazard, reduce the likelihood of the occurrence of a hazard, reduce the likelihood of a hazard leading to an accident, or reduce the damage caused by an accident?
    • Why this redesign, and not others?

You should aim for a system's perspective in this exercise. It is important to realize that the system and its context implies both the likely character of threats/hazards and limitations/opportunities for mitigation measures. Generic approaches ("Give each employee a secure token for accessing the system") are not always possible to use ("Those accessing the system might not all be employees and often replaced.") or meaningless ("The most likely threat is an disgruntled insider with high security clearance."). By contrast, contextual factors can provide opportunities that are not usually present ("We limit the risk of accidents by allowing safe storage even of contraband, if an attacker has made it past X security barriers".) 

You hand in the presentation here in a PPTx format, with what you aim to say during the presentation in the notes to each slide.