Pierre-Loïc Garoche
- Published in print:
- 2019
- Published Online:
- January 2020
- ISBN:
- 9780691181301
- eISBN:
- 9780691189581
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181301.003.0001
- Subject:
- Mathematics, Applied Mathematics
This chapter looks at the current state of physical systems controlled by an onboard computer. Typically this covers transportation systems such as cars, aircraft, railway systems, space systems, or ...
More
This chapter looks at the current state of physical systems controlled by an onboard computer. Typically this covers transportation systems such as cars, aircraft, railway systems, space systems, or even medical devices, all of them either for the expected harmfulness for people, or for the huge cost associated with their failure. The chapter shows how the increase of computer use in those systems has led to huge benefits, but also an exponential growth in complexity. Furthermore, the drawback of this massive introduction of computers to control systems is the lack of predictability for both computer and software. This chapter shows how the aerospace industry, and more generally critical embedded systems industries, is now facing a huge increase in the software size in their systems. This in turn creates a greater system complexity increase because of safety or performance objectives. Moreover, this complexity leads to the need to integrate even more advanced algorithms to sustain autonomy and energy efficiency.Less
This chapter looks at the current state of physical systems controlled by an onboard computer. Typically this covers transportation systems such as cars, aircraft, railway systems, space systems, or even medical devices, all of them either for the expected harmfulness for people, or for the huge cost associated with their failure. The chapter shows how the increase of computer use in those systems has led to huge benefits, but also an exponential growth in complexity. Furthermore, the drawback of this massive introduction of computers to control systems is the lack of predictability for both computer and software. This chapter shows how the aerospace industry, and more generally critical embedded systems industries, is now facing a huge increase in the software size in their systems. This in turn creates a greater system complexity increase because of safety or performance objectives. Moreover, this complexity leads to the need to integrate even more advanced algorithms to sustain autonomy and energy efficiency.
Paul Schulman and Emery Roe
- Published in print:
- 2016
- Published Online:
- January 2017
- ISBN:
- 9780804793933
- eISBN:
- 9780804798624
- Item type:
- book
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804793933.001.0001
- Subject:
- Business and Management, Organization Studies
High-reliability management of critical infrastructures-the safe and continued provision of electricity, natural gas, telecommunications, transportation, and water-is a social imperative. Loss of ...
More
High-reliability management of critical infrastructures-the safe and continued provision of electricity, natural gas, telecommunications, transportation, and water-is a social imperative. Loss of service in interconnected critical infrastructure systems (ICISs) after hurricanes, earthquakes, floods, and tsunamis and their delayed large-scale recovery have turned these events into catastrophes. Reliability and Risk reveals a neglected management dimension and provides a new framework for understanding interconnected infrastructures, their potential for cascading failure, and how to improve their reliability and reduce risk of system failure. The book answers two questions: How are modern interconnected infrastructures managed and regulated for reliability? How can policy makers, analysts, managers, and citizenry better promote reliability in interconnected systems whose failures can scarcely be imagined? The current consensus is that the answers lie in better design, technology, and regulation, but the book argues that these have inevitable shortfalls and that it is dangerous to stop there. The framework developed in Reliability and Risk draws from first-of-its-kind research at the infrastructure crossroads of California, the California Delta, in the San Francisco Bay region. The book demonstrates that infrastructure reliability in an interconnected world must be managed by system professionals in real time.Less
High-reliability management of critical infrastructures-the safe and continued provision of electricity, natural gas, telecommunications, transportation, and water-is a social imperative. Loss of service in interconnected critical infrastructure systems (ICISs) after hurricanes, earthquakes, floods, and tsunamis and their delayed large-scale recovery have turned these events into catastrophes. Reliability and Risk reveals a neglected management dimension and provides a new framework for understanding interconnected infrastructures, their potential for cascading failure, and how to improve their reliability and reduce risk of system failure. The book answers two questions: How are modern interconnected infrastructures managed and regulated for reliability? How can policy makers, analysts, managers, and citizenry better promote reliability in interconnected systems whose failures can scarcely be imagined? The current consensus is that the answers lie in better design, technology, and regulation, but the book argues that these have inevitable shortfalls and that it is dangerous to stop there. The framework developed in Reliability and Risk draws from first-of-its-kind research at the infrastructure crossroads of California, the California Delta, in the San Francisco Bay region. The book demonstrates that infrastructure reliability in an interconnected world must be managed by system professionals in real time.
Pierre-Loïc Garoche
- Published in print:
- 2019
- Published Online:
- January 2020
- ISBN:
- 9780691181301
- eISBN:
- 9780691189581
- Item type:
- book
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181301.001.0001
- Subject:
- Mathematics, Applied Mathematics
The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can ...
More
The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.Less
The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.
Gregory Falco and Eric Rosenbach
- Published in print:
- 2022
- Published Online:
- November 2021
- ISBN:
- 9780197526545
- eISBN:
- 9780197526576
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197526545.003.0003
- Subject:
- Business and Management, Information Technology
The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case ...
More
The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.Less
The question “How do I assess our cyber risk?” addresses how to identify and characterize cyber risk unique to an organization’s critical systems, networks, and data. The chapter begins with a case study about a cyberattack on Ukraine’s electric grid. It details risk assessment for three types of critical systems: mission-critical systems, business-critical systems, and safety-critical systems. It explains the three types of networks critical to many organizations: business and administrative networks, operational and service delivery networks, and communication networks. In outlining the “CIA triad,” it shows how cyber risk can be characterized as a confidentiality, integrity, or availability issue relating to digital assets. Further, it describes how to assess the importance of different digital assets and how to prioritize them using a business impact analysis (BIA). The chapter concludes with real-world Embedded Endurance strategy lessons Rosenbach gained in Saudi Arabia in the wake of one of the world’s most destructive cyberattacks.
Emery Roe and Paul R. Schulman
- Published in print:
- 2016
- Published Online:
- January 2017
- ISBN:
- 9780804793933
- eISBN:
- 9780804798624
- Item type:
- chapter
- Publisher:
- Stanford University Press
- DOI:
- 10.11126/stanford/9780804793933.003.0007
- Subject:
- Business and Management, Organization Studies
This chapter expands the discussion of how time and scale interact with risk when managing infrastructures for reliability. The whole cycle of infrastructure operations ranges from normal to ...
More
This chapter expands the discussion of how time and scale interact with risk when managing infrastructures for reliability. The whole cycle of infrastructure operations ranges from normal to disrupted, restored, failed, recovered, and new normal. Risks vary by the stage of the cycle, and each stage is managed for reliability differently. Thus, a disruption in one infrastructure of an ICIS requires not only zooming down to determine root causes but also zooming up to determine its impact on the entire infrastructure as a system and zooming across to determine how these impacts affect infrastructures interconnected with it. Two examples-the 2010 San Bruno gas explosion and the major nexus of infrastructure on an island in the Delta-illustrate how risk analysis is to be undertaken in the ICIS setting.Less
This chapter expands the discussion of how time and scale interact with risk when managing infrastructures for reliability. The whole cycle of infrastructure operations ranges from normal to disrupted, restored, failed, recovered, and new normal. Risks vary by the stage of the cycle, and each stage is managed for reliability differently. Thus, a disruption in one infrastructure of an ICIS requires not only zooming down to determine root causes but also zooming up to determine its impact on the entire infrastructure as a system and zooming across to determine how these impacts affect infrastructures interconnected with it. Two examples-the 2010 San Bruno gas explosion and the major nexus of infrastructure on an island in the Delta-illustrate how risk analysis is to be undertaken in the ICIS setting.
Pierre-Loïc Garoche
- Published in print:
- 2019
- Published Online:
- January 2020
- ISBN:
- 9780691181301
- eISBN:
- 9780691189581
- Item type:
- chapter
- Publisher:
- Princeton University Press
- DOI:
- 10.23943/princeton/9780691181301.003.0002
- Subject:
- Mathematics, Applied Mathematics
This chapter gives a brief overview of some formal methods and their use in the context of critical embedded systems development. While testing is a common practice for a lot of engineers as a way to ...
More
This chapter gives a brief overview of some formal methods and their use in the context of critical embedded systems development. While testing is a common practice for a lot of engineers as a way to evaluate whether the program they developed fulfills its needs, formal methods are less known and may require a little introduction to the non-expert. This chapter thus serves as a reasonable introduction to the control expert engineer. It first defines the semantics of programs: their basic properties and their meaning. Then, the chapter outlines different formal verifications and explains how they reason on the program artifact. A last part addresses the soundness of the analyses with respect to the actual semantics.Less
This chapter gives a brief overview of some formal methods and their use in the context of critical embedded systems development. While testing is a common practice for a lot of engineers as a way to evaluate whether the program they developed fulfills its needs, formal methods are less known and may require a little introduction to the non-expert. This chapter thus serves as a reasonable introduction to the control expert engineer. It first defines the semantics of programs: their basic properties and their meaning. Then, the chapter outlines different formal verifications and explains how they reason on the program artifact. A last part addresses the soundness of the analyses with respect to the actual semantics.
Gregory Falco and Eric Rosenbach
- Published in print:
- 2022
- Published Online:
- November 2021
- ISBN:
- 9780197526545
- eISBN:
- 9780197526576
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780197526545.003.0008
- Subject:
- Business and Management, Information Technology
The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The ...
More
The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The chapter begins with a case study about the NotPetya cyberattack, which highlights ongoing challenges in cyber insurance and illuminates the need for embedding cyber mitigation measures across all prioritized critical systems, networks, and data. The chapter describes how to develop an Embedded Endurance cyber risk strategy that is customized for your organization. This chapter walks readers through the key elements of a cyber strategy, from start to finish. This includes defining a risk framework, setting strategic goals, identifying metrics, and establishing strong leadership. The chapter concludes with experiences highlighting the real-world importance of an Embedded Endurance cyber risk strategy from Rosenbach and Falco.Less
The question “How do I embed cyber risk management in all aspects of the organization?” addresses how to adopt an Embedded Endurance cyber risk strategy in your day-to-day work as a cyber leader. The chapter begins with a case study about the NotPetya cyberattack, which highlights ongoing challenges in cyber insurance and illuminates the need for embedding cyber mitigation measures across all prioritized critical systems, networks, and data. The chapter describes how to develop an Embedded Endurance cyber risk strategy that is customized for your organization. This chapter walks readers through the key elements of a cyber strategy, from start to finish. This includes defining a risk framework, setting strategic goals, identifying metrics, and establishing strong leadership. The chapter concludes with experiences highlighting the real-world importance of an Embedded Endurance cyber risk strategy from Rosenbach and Falco.
Karl Ameriks
- Published in print:
- 2019
- Published Online:
- December 2019
- ISBN:
- 9780198841852
- eISBN:
- 9780191881435
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198841852.003.0009
- Subject:
- Philosophy, Metaphysics/Epistemology, Philosophy of Science
This chapter responds primarily to a recent criticism of Kant by Stephen Houlgate. Like many other recent Hegelian accounts, Houlgate’s severe critique of Kant’s theoretical philosophy contends that, ...
More
This chapter responds primarily to a recent criticism of Kant by Stephen Houlgate. Like many other recent Hegelian accounts, Houlgate’s severe critique of Kant’s theoretical philosophy contends that, in contrast to Hegel, Kant’s Critical system, especially because of its doctrine of transcendental idealism, presupposes a subjectivist and therefore inadequate position. On the basis of a moderate interpretation of Kant’s idealism and his general Critical procedure, the chapter defends Kant from the charge of subjectivism, and also gives an account of how subjectivist interpretations in general can arise from a series of understandable misunderstandings of difficult passages in Kant’s Critique of Pure Reason.Less
This chapter responds primarily to a recent criticism of Kant by Stephen Houlgate. Like many other recent Hegelian accounts, Houlgate’s severe critique of Kant’s theoretical philosophy contends that, in contrast to Hegel, Kant’s Critical system, especially because of its doctrine of transcendental idealism, presupposes a subjectivist and therefore inadequate position. On the basis of a moderate interpretation of Kant’s idealism and his general Critical procedure, the chapter defends Kant from the charge of subjectivism, and also gives an account of how subjectivist interpretations in general can arise from a series of understandable misunderstandings of difficult passages in Kant’s Critique of Pure Reason.