SlideShare ist ein Scribd-Unternehmen logo
1 von 12
F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures presented by Francesco Flammini Ansaldo STS Italy – Business Innovation Unit University Federico II of Naples – Department of Computer and Systems Engineering 3rd International Workshop on Critical Information Infrastructures Security CRITIS’08 October 13-15 2008, Frascati (Rome), Italy
Critical Infrastructure Security ,[object Object],[object Object],Analysis and assessment Remediation Indications and warning Mitigation Response Reconstitution Pre-Event Post-Event Event
Risk Analysis ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Quantitative Definition of Risk ,[object Object],[object Object],[object Object],[object Object]
Effect of Protection Mechanisms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Extensive Risk Formula ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Return on investment ,[object Object],[object Object],Investment in Risk Reduction Measures (€) Residual Risk Typical risk reduction curve for  safety incidents  with an optimized incremental investments order Typical risk reduction curve for  security incidents  with an optimized incremental investments order 1 st   investment 2 nd  investment further investments with lower  cost-effectiveness Installation of Backbone Network CCTV Installation Digital Video Recording Access Control and Intrusion Detection Systems Operational and System Integration  Blast Containment Trash Cans Advanced Security Management System
The Q-RA tool: software architecture ,[object Object],[object Object]
Example application THREATS PROTECTION MECHANISMS
Q-RA GUI: example inputs and outputs
Conclusions & future works ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Thank you for your kind attention. Any questions?

Weitere ähnliche Inhalte

Ähnlich wie Critis08 Q Ra

Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachIJNSA Journal
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept IJECEIAES
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Community Protection Forum
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...IAEME Publication
 
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...IJNSA Journal
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...idescitation
 
F041123639
F041123639F041123639
F041123639IOSR-JEN
 
Chapter Nine(1).docx
Chapter Nine(1).docxChapter Nine(1).docx
Chapter Nine(1).docxAbebaw Mamaru
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaPankaj K Sinha
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsIJCNCJournal
 
Available online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxAvailable online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxrock73
 
Risk and Safety in Work Environments
Risk and Safety in Work EnvironmentsRisk and Safety in Work Environments
Risk and Safety in Work EnvironmentsMahsa Teimourikia
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
 
Petri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical VulnerabilityPetri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical Vulnerabilitystefanounina2
 
Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Francesco Flammini
 

Ähnlich wie Critis08 Q Ra (20)

Attack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approachAttack graph based risk assessment and optimisation approach
Attack graph based risk assessment and optimisation approach
 
Ijciet 10 02_001
Ijciet 10 02_001Ijciet 10 02_001
Ijciet 10 02_001
 
A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept A risk and security assessment of VANET availability using attack tree concept
A risk and security assessment of VANET availability using attack tree concept
 
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
 
Risks in cc
Risks in ccRisks in cc
Risks in cc
 
Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...Quantified Risk Assessment as a decision support for the protection of the Cr...
Quantified Risk Assessment as a decision support for the protection of the Cr...
 
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
Hybrid layer of protection analysis and bow tie analysis with fuzzy approach ...
 
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
OPTIMIZING AND ANALYSING THE EFFECTIVENESS OF SECURITY HARDENING MEASURES USI...
 
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
Modeling SYN Flooding DoS Attacks using Attack Countermeasure Trees and Findi...
 
F041123639
F041123639F041123639
F041123639
 
Chapter Nine(1).docx
Chapter Nine(1).docxChapter Nine(1).docx
Chapter Nine(1).docx
 
Project Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K SinhaProject Risk Management-Pankaj K Sinha
Project Risk Management-Pankaj K Sinha
 
A predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphsA predictive framework for cyber security analytics using attack graphs
A predictive framework for cyber security analytics using attack graphs
 
CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2CSIAC_V1N4_FINAL_2
CSIAC_V1N4_FINAL_2
 
Available online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docxAvailable online at www.sciencedirect.comComputers & Industr.docx
Available online at www.sciencedirect.comComputers & Industr.docx
 
Risk and Safety in Work Environments
Risk and Safety in Work EnvironmentsRisk and Safety in Work Environments
Risk and Safety in Work Environments
 
Icra poster
Icra posterIcra poster
Icra poster
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
 
Petri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical VulnerabilityPetri Net Modelling of Physical Vulnerability
Petri Net Modelling of Physical Vulnerability
 
Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...Dependable integrated surveillance systems for the physical security of metro...
Dependable integrated surveillance systems for the physical security of metro...
 

Mehr von Francesco Flammini

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfFrancesco Flammini
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfFrancesco Flammini
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfFrancesco Flammini
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateFrancesco Flammini
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021Francesco Flammini
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyFrancesco Flammini
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...Francesco Flammini
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingFrancesco Flammini
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19Francesco Flammini
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Francesco Flammini
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiFrancesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNUFrancesco Flammini
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual couplingFrancesco Flammini
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietyFrancesco Flammini
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560Francesco Flammini
 

Mehr von Francesco Flammini (20)

TRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdfTRA Visions Senior Researcher Award 2024.pdf
TRA Visions Senior Researcher Award 2024.pdf
 
RAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdfRAILS - Railway Gazette 2023 (Flammini).pdf
RAILS - Railway Gazette 2023 (Flammini).pdf
 
Award-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdfAward-Fedcsis Conference 2023.pdf
Award-Fedcsis Conference 2023.pdf
 
Internationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference CertificateInternationalization of the Curriculum Conference Certificate
Internationalization of the Curriculum Conference Certificate
 
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
IEEE SMC TCHS Award Ceremony at IEEE CSR conference 2021
 
Appreciation Certificate
Appreciation CertificateAppreciation Certificate
Appreciation Certificate
 
Digital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy AutonomyDigital Twins for Trustworthy Autonomy
Digital Twins for Trustworthy Autonomy
 
IEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificateIEEE GCAIIoT 2020 certificate
IEEE GCAIIoT 2020 certificate
 
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
IEEE Intelligent Transportation Systems Conference 2020 - Low-Power Wide-Area...
 
Science of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of ReviewingScience of Computer Programming, Certificate of Reviewing
Science of Computer Programming, Certificate of Reviewing
 
ACM DSP appointment letter
ACM DSP appointment letter ACM DSP appointment letter
ACM DSP appointment letter
 
“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19“AI techniques in cyber-security applications”. Flammini lnu susec19
“AI techniques in cyber-security applications”. Flammini lnu susec19
 
Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009Ansaldo STS Innovation award 2009
Ansaldo STS Innovation award 2009
 
Ansaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco FlamminiAnsaldo STS Innovation Award 2014 - Francesco Flammini
Ansaldo STS Innovation Award 2014 - Francesco Flammini
 
IoT Research & Education at LNU
IoT Research & Education at LNUIoT Research & Education at LNU
IoT Research & Education at LNU
 
Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19Francesco Flammini - talk at DISCORAIL'19
Francesco Flammini - talk at DISCORAIL'19
 
Towards railway virtual coupling
Towards railway virtual couplingTowards railway virtual coupling
Towards railway virtual coupling
 
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected SocietySmart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
Smart-Troubleshooting Symbiotic Autonomous Systems in the Connected Society
 
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
SuccesfulGrantApplications_Jan 23, 2017_certificate-506560
 
Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298Attestato FLAMMINI ISO 14298
Attestato FLAMMINI ISO 14298
 

Kürzlich hochgeladen

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 

Kürzlich hochgeladen (20)

04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Critis08 Q Ra

  • 1. F. Flammini, A. Gaglione, N. Mazzocca, C. Pragliola Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures presented by Francesco Flammini Ansaldo STS Italy – Business Innovation Unit University Federico II of Naples – Department of Computer and Systems Engineering 3rd International Workshop on Critical Information Infrastructures Security CRITIS’08 October 13-15 2008, Frascati (Rome), Italy
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Example application THREATS PROTECTION MECHANISMS
  • 10. Q-RA GUI: example inputs and outputs
  • 11.
  • 12. Thank you for your kind attention. Any questions?