2014
DOI: 10.1007/978-3-662-43896-1_25
|View full text |Cite
|
Sign up to set email alerts
|

Finding Threats with Hazards in the Concept Phase of Product Development

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
2

Relationship

1
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
“…These values along with control risk reflecting safety and security design assessment define safety-security risk of an incident. 6) Ito (2014) [15] proposes an analysis for threats and hazards identification as an extension of the hazard identification approach CARDION. The approach is iterative and includes four phases: system sketching; top goal identification and its decomposition; applying HAZOP guidewords to each goal; threat and hazards identification.…”
Section: ) Raspotning Et Al (2012) [10] Present Combined Harmmentioning
confidence: 99%
“…The analysis proposed by [18] is based on FMEA that considers only single causes of an effect, which excludes multi-stage attacks consideration. The method presented by Popov (2015) [28] may require a more complex [24], [32], [40], [45], [46] [11], [33] Unified [6], [13], [15], [17], [23], [25], [34], [36], [39], [41], [42], [43], [35], [49] [10], [12], [18], [21], [26], [28], [29], [31], [37], [38], [44], [47] failure model to address failure dependencies and trade-offs between safety and security. The approach proposed by Wei et al (2015) [31] has a limitation in terms of failures connections.…”
Section: B Resultsmentioning
confidence: 99%
“…In Ito (2014), the author proposes an extension of his own method called CARDION Ito and Kishida (2014), which initially aims to perform risk analysis, adapted to the automotive world. In this extension, a consideration of threats has been added.…”
Section: Extension Of Cardion Methodsmentioning
confidence: 99%