27.06.2013 Views

(in) Security - Academic Conferences Limited

(in) Security - Academic Conferences Limited

(in) Security - Academic Conferences Limited

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Graeme Pye and Matthew Warren<br />

Object-orientated theme models objects that represent elements of the system <strong>in</strong>clud<strong>in</strong>g people,<br />

data, processes and the <strong>in</strong>teraction of these objects.<br />

These themes are each applicable to general system analysis or modell<strong>in</strong>g <strong>in</strong> the terms of their specific<br />

characteristics of application, however there is no s<strong>in</strong>gular theme directly applicable for critiqu<strong>in</strong>g and<br />

modell<strong>in</strong>g critical <strong>in</strong>frastructure systems.<br />

2.2 Blend<strong>in</strong>g methodological approaches<br />

As Avison (2003b) outl<strong>in</strong>es, methodologies provide a set detailed rules and guidel<strong>in</strong>es to follow and work<br />

to that deliver a highly structured design approach to the specific task they are to address. Therefore, <strong>in</strong><br />

the logical extension lies <strong>in</strong> utilis<strong>in</strong>g a number of <strong>in</strong>dividual themes or approaches <strong>in</strong> comb<strong>in</strong>ation, to br<strong>in</strong>g<br />

together characteristics of each specific method to provide specific expertise to meet the overall practical<br />

criteria and <strong>in</strong>tention of critiqu<strong>in</strong>g and modell<strong>in</strong>g of critical <strong>in</strong>frastructure systems (Wood-Harper et al<br />

1985).<br />

Therefore, a blended methodological approach utilis<strong>in</strong>g multiple system analysis and system modell<strong>in</strong>g<br />

approaches <strong>in</strong> comb<strong>in</strong>ation would conceivably br<strong>in</strong>g together the characteristics of each that is applicable<br />

to achiev<strong>in</strong>g the overall goal of critiqu<strong>in</strong>g and modell<strong>in</strong>g critical <strong>in</strong>frastructure systems.<br />

2.3 System analysis modell<strong>in</strong>g<br />

Other modell<strong>in</strong>g approaches related to <strong>in</strong>formation system analysis that Dennis et al (2009) discusses are<br />

as follows:<br />

Functional modell<strong>in</strong>g is a description of the processes and the <strong>in</strong>teraction of the system with its<br />

environment.<br />

Structural modell<strong>in</strong>g is a conceptual description of the structure of the data support<strong>in</strong>g the processes<br />

and presents the logical organisation of data without focuss<strong>in</strong>g on the technical details of how the<br />

data is stored, created or manipulated.<br />

Behavioural modell<strong>in</strong>g describes the <strong>in</strong>ternal dynamic aspects of a system that support the processes<br />

by describ<strong>in</strong>g the <strong>in</strong>ternal logic of the processes without specify<strong>in</strong>g the process implementation.<br />

While these approaches may not necessarily be directly applicable to this research, <strong>in</strong> terms of critiqu<strong>in</strong>g<br />

and modell<strong>in</strong>g critical <strong>in</strong>frastructure systems there are elements of these approaches that are<br />

complimentary to system analysis and the pr<strong>in</strong>ciples of system modell<strong>in</strong>g.<br />

The pr<strong>in</strong>ciple <strong>in</strong>tention of system security analysis is to determ<strong>in</strong>e an <strong>in</strong>tricate understand<strong>in</strong>g of the focal<br />

systems to identify and monitor potential system vulnerabilities and develop solutions. An additional<br />

approach to enhance the <strong>in</strong>sights ga<strong>in</strong>ed from system analysis <strong>in</strong>to the functional characteristics, security<br />

and structural features of systems is to develop a model of the subject system that conceptually<br />

represents the focal, real-world system of <strong>in</strong>terest for further <strong>in</strong>vestigation.<br />

3. Analysis and modell<strong>in</strong>g: The challenges<br />

The challenges of analys<strong>in</strong>g and modell<strong>in</strong>g such large-scale systems, <strong>in</strong>clud<strong>in</strong>g their dependency<br />

relationships with other systems and their non-l<strong>in</strong>ear and time-dependent behaviour, rema<strong>in</strong> largely<br />

undeterm<strong>in</strong>ed. Accord<strong>in</strong>g to McDonald and Bologna (2003), mathematical models of critical <strong>in</strong>frastructure<br />

systems are vague and there are no applicable methodologies for assess<strong>in</strong>g and comprehend<strong>in</strong>g the<br />

<strong>in</strong>tricacies of critical <strong>in</strong>frastructure systems. Add to this the effects of human <strong>in</strong>teraction, from both the<br />

perspective of a susceptibility to <strong>in</strong>stigate failure and adaptability to manage and recover wayward<br />

systems. This requires that modell<strong>in</strong>g these networked critical <strong>in</strong>frastructure systems is not only about<br />

modell<strong>in</strong>g the subject system itself, but <strong>in</strong>corporat<strong>in</strong>g consequential rationality of actual human th<strong>in</strong>k<strong>in</strong>g,<br />

responses and reactions, <strong>in</strong>clud<strong>in</strong>g the topology and dynamics of these large complex network systems<br />

(Macdonald & Bologna ibid, Peters et al 2008).<br />

Furthermore, there are additional complexity factors with network systems that are <strong>in</strong>herently difficult to<br />

comprehend (McDonald & Bologna 2003):<br />

Structural complexity – <strong>in</strong>creas<strong>in</strong>g number of nodes and l<strong>in</strong>ks between nodes;<br />

Network evolution – the structural l<strong>in</strong>kage which could change over time;<br />

195

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!