SlideShare a Scribd company logo
1 of 20
Download to read offline
Experience Report:


Modelling and Simulation of 

Railway Emergency Response Plans
ITU ProSec, May 2nd, 2016
Søren Debois
Joint work with Thomas Hildebrandt & Lene Sandberg
Plan
• Cyber-threats to Critical Infrastructure
• The method
• The Great Belt Bridge incident case
• Collaborative mapping & simulation
• Conclusions
Cyber-threats & Infrastructure
Cyber-physical attacks on 

Critical Infrastructure
• Operators (DSB, BaneDanmark) robust against
physical incidents, including terrorism.
• Operators IT system landscape very large and
varied.
• However, traditional “No-IT” approach to train
operators still form foundations of day-to-day
operations.
The potential weakness
• Cyber-physical assault: Combined physical &
cyber attack.
• Do emergency response plans hold up when both
IT and physical infrastructure is physically
attacked?
How to investigate?
• Extensive emergency response plans exist. Drills are
performed regularly.
• Let’s simulate!
• But wait! Paper-based rehearsals don’t actually use ICT
systems. How to simulate?
• We need to simulate both the actions of drill participants
and breakdowns of IT systems.
• We have to be sure no-one “cheats” by accidentally
assuming some system is functioning.
Declarative Process Models
• Formal model of emergency response process.
• Give enormous freedom within a set of rules.
• No-one cheats accidentally; the model won’t allow
it.
Example
How do we try this out?


How do we get the process model?
Case: Great Belt Bridge
Collaborative mapping
• Extensive documentation of emergency response
procedures exists.
• We sat down with domain experts from DSB &
BaneDanmark and constructed a model based on
that documentation.
How do we know whether
this model is meaningful?
Collaborative simulation
• Simulation gives the ability to explore un-
anticipated paths and “what-if” scenarios.
• Collaborative simulation brings a new level of
realism, especially for coordination problems of
emergency response scenarios.
Simulation study, Metropol
• At Metropol, students of Emergency and Risk
Management as participants.
• Tool provided insufficient overview.
• Tool did not hide available and executed actions of
other participants .
Simulation study, DSB
• At DSB, with DSB emergency response team lead
and experienced train driver.
• Recommendations: 

Pictures, text, documentation in-tool.
Conclusions
Conclusions
• Collaborative mapping and simulation of
emergency response processes is a viable means
of studying ICT/Cyber-physical vulnerabilities.
• DCR Formalism accessible to domain experts (with
assistance)
• DCR Tooling almost there.
Future work
• Integrating the IT system landscape into the model.
Thank you!
Søren Debois

More Related Content

Viewers also liked

Viewers also liked (20)

Proof of Concept af en fleksibel løsning til små online møder
Proof of Concept af en fleksibel løsning til små online møderProof of Concept af en fleksibel løsning til små online møder
Proof of Concept af en fleksibel løsning til små online møder
 
Proactive prevention of obligation violations
Proactive prevention of obligation violationsProactive prevention of obligation violations
Proactive prevention of obligation violations
 
Process-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements EngineeringProcess-oriented Security Risk Analysis and Requirements Engineering
Process-oriented Security Risk Analysis and Requirements Engineering
 
Gamification workshop Marianne Hilton
Gamification workshop Marianne HiltonGamification workshop Marianne Hilton
Gamification workshop Marianne Hilton
 
Udforskning af problem gennem forslag til dets løsning
Udforskning af problem gennem forslag til dets løsningUdforskning af problem gennem forslag til dets løsning
Udforskning af problem gennem forslag til dets løsning
 
Procesarbejdet i Nykredit, John Nielsen, Nykredit
Procesarbejdet i Nykredit, John Nielsen, NykreditProcesarbejdet i Nykredit, John Nielsen, Nykredit
Procesarbejdet i Nykredit, John Nielsen, Nykredit
 
Gamification workshop Thomas Hildebrandt
Gamification workshop   Thomas HildebrandtGamification workshop   Thomas Hildebrandt
Gamification workshop Thomas Hildebrandt
 
Gamification workshop Tine Weirsøe
Gamification workshop   Tine WeirsøeGamification workshop   Tine Weirsøe
Gamification workshop Tine Weirsøe
 
Gamification workshop michelle
Gamification workshop   michelleGamification workshop   michelle
Gamification workshop michelle
 
Process modelling at BaneDanmark
Process modelling at BaneDanmarkProcess modelling at BaneDanmark
Process modelling at BaneDanmark
 
Systematisk brug af pair programming
Systematisk brug af pair programmingSystematisk brug af pair programming
Systematisk brug af pair programming
 
Overview of the ProSec project
Overview of the ProSec projectOverview of the ProSec project
Overview of the ProSec project
 
Fleksibel procesdigitalisering
Fleksibel procesdigitaliseringFleksibel procesdigitalisering
Fleksibel procesdigitalisering
 
Di sc workplace profile infinit clean
Di sc workplace profile infinit cleanDi sc workplace profile infinit clean
Di sc workplace profile infinit clean
 
Værdiskabelse i projekter
Værdiskabelse i projekterVærdiskabelse i projekter
Værdiskabelse i projekter
 
Projektledelse og softwareinnovation
Projektledelse og softwareinnovationProjektledelse og softwareinnovation
Projektledelse og softwareinnovation
 
Agilitet i hurtigt voksende softwarevirksomheder
Agilitet i hurtigt voksende softwarevirksomhederAgilitet i hurtigt voksende softwarevirksomheder
Agilitet i hurtigt voksende softwarevirksomheder
 
Introduktion til udviklingsprocesser og agile processer
Introduktion til udviklingsprocesser og agile processerIntroduktion til udviklingsprocesser og agile processer
Introduktion til udviklingsprocesser og agile processer
 
Produktudvikling hos Grundfos igennem underleverandør
Produktudvikling hos Grundfos igennem underleverandørProduktudvikling hos Grundfos igennem underleverandør
Produktudvikling hos Grundfos igennem underleverandør
 
Value Creation in SaaS Development
Value Creation in SaaS DevelopmentValue Creation in SaaS Development
Value Creation in SaaS Development
 

Similar to Modelling and Simulation of the response process for an emergency at the Great Belt bridge

What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?Nane Kratzke
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance VideoIRJET Journal
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6Rod Soto
 
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)scirexcenter
 
The Path to Digital Engineering
The Path to Digital EngineeringThe Path to Digital Engineering
The Path to Digital EngineeringElizabeth Steiner
 
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEDIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEiQHub
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupShlomo Yona
 
Era ofdataeconomyv4short
Era ofdataeconomyv4shortEra ofdataeconomyv4short
Era ofdataeconomyv4shortJun Miyazaki
 
ExaLearn Overview - ECP Co-Design Center for Machine Learning
ExaLearn Overview - ECP Co-Design Center for Machine LearningExaLearn Overview - ECP Co-Design Center for Machine Learning
ExaLearn Overview - ECP Co-Design Center for Machine Learninginside-BigData.com
 
[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...PAPIs.io
 
Pydata Chicago - work hard once
Pydata Chicago - work hard oncePydata Chicago - work hard once
Pydata Chicago - work hard onceJi Dong
 
Overview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxOverview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxalfred4lewis58146
 
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...Ilab Metis: we optimize power systems and we are not afraid of direct policy ...
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...Olivier Teytaud
 
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...Matti Luhtala
 

Similar to Modelling and Simulation of the response process for an emergency at the Great Belt bridge (20)

What the cloud has to do with a burning house?
What the cloud has to do with a burning house?What the cloud has to do with a burning house?
What the cloud has to do with a burning house?
 
IRJET- Criminal Recognization in CCTV Surveillance Video
IRJET-  	  Criminal Recognization in CCTV Surveillance VideoIRJET-  	  Criminal Recognization in CCTV Surveillance Video
IRJET- Criminal Recognization in CCTV Surveillance Video
 
BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6BsidesLVPresso2016_JZeditsv6
BsidesLVPresso2016_JZeditsv6
 
Spatio Temporal Data Mining
Spatio Temporal Data MiningSpatio Temporal Data Mining
Spatio Temporal Data Mining
 
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)
Collaborative Research with UK MOD - an Academic's Experience ((John Fitzgerald)
 
The Path to Digital Engineering
The Path to Digital EngineeringThe Path to Digital Engineering
The Path to Digital Engineering
 
ppt for mini project .pptx
ppt for mini project .pptxppt for mini project .pptx
ppt for mini project .pptx
 
Applications of Machine Learning
Applications of Machine LearningApplications of Machine Learning
Applications of Machine Learning
 
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUEDIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
DIGITAL TWIN FOR ENHANCING ASSETS INTEGRITY VALUE
 
Rise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetupRise of the machines -- Owasp israel -- June 2014 meetup
Rise of the machines -- Owasp israel -- June 2014 meetup
 
Era ofdataeconomyv4short
Era ofdataeconomyv4shortEra ofdataeconomyv4short
Era ofdataeconomyv4short
 
Derek Wright: risk v uncertainty case study
Derek Wright: risk v uncertainty case studyDerek Wright: risk v uncertainty case study
Derek Wright: risk v uncertainty case study
 
SBSE-class1.pdf
SBSE-class1.pdfSBSE-class1.pdf
SBSE-class1.pdf
 
ExaLearn Overview - ECP Co-Design Center for Machine Learning
ExaLearn Overview - ECP Co-Design Center for Machine LearningExaLearn Overview - ECP Co-Design Center for Machine Learning
ExaLearn Overview - ECP Co-Design Center for Machine Learning
 
Edge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systemsEdge computing system for large scale distributed sensing systems
Edge computing system for large scale distributed sensing systems
 
[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...[Keynote] predictive technologies and the prediction of technology - Bob Will...
[Keynote] predictive technologies and the prediction of technology - Bob Will...
 
Pydata Chicago - work hard once
Pydata Chicago - work hard oncePydata Chicago - work hard once
Pydata Chicago - work hard once
 
Overview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docxOverview1) Overview – The continued discussion of project implem.docx
Overview1) Overview – The continued discussion of project implem.docx
 
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...Ilab Metis: we optimize power systems and we are not afraid of direct policy ...
Ilab Metis: we optimize power systems and we are not afraid of direct policy ...
 
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...
Proactive Rescue Work by Enhancing Situational Awareness: Modeling Resources,...
 

More from InfinIT - Innovationsnetværket for it

More from InfinIT - Innovationsnetværket for it (20)

Erfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermarkErfaringer med-c kurt-noermark
Erfaringer med-c kurt-noermark
 
Object orientering, test driven development og c
Object orientering, test driven development og cObject orientering, test driven development og c
Object orientering, test driven development og c
 
Embedded softwaredevelopment hcs
Embedded softwaredevelopment hcsEmbedded softwaredevelopment hcs
Embedded softwaredevelopment hcs
 
C og c++-jens lund jensen
C og c++-jens lund jensenC og c++-jens lund jensen
C og c++-jens lund jensen
 
201811xx foredrag c_cpp
201811xx foredrag c_cpp201811xx foredrag c_cpp
201811xx foredrag c_cpp
 
C som-programmeringssprog-bt
C som-programmeringssprog-btC som-programmeringssprog-bt
C som-programmeringssprog-bt
 
Infinit seminar 060918
Infinit seminar 060918Infinit seminar 060918
Infinit seminar 060918
 
DCR solutions
DCR solutionsDCR solutions
DCR solutions
 
Not your grandfathers BPM
Not your grandfathers BPMNot your grandfathers BPM
Not your grandfathers BPM
 
Kmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolutionKmd workzone - an evolutionary approach to revolution
Kmd workzone - an evolutionary approach to revolution
 
EcoKnow - oplæg
EcoKnow - oplægEcoKnow - oplæg
EcoKnow - oplæg
 
Martin Wickins Chatbots i fronten
Martin Wickins Chatbots i frontenMartin Wickins Chatbots i fronten
Martin Wickins Chatbots i fronten
 
Marie Fenger ai kundeservice
Marie Fenger ai kundeserviceMarie Fenger ai kundeservice
Marie Fenger ai kundeservice
 
Mads Kaysen SupWiz
Mads Kaysen SupWizMads Kaysen SupWiz
Mads Kaysen SupWiz
 
Leif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support CenterLeif Howalt NNIT Service Support Center
Leif Howalt NNIT Service Support Center
 
Jan Neerbek NLP og Chatbots
Jan Neerbek NLP og ChatbotsJan Neerbek NLP og Chatbots
Jan Neerbek NLP og Chatbots
 
Anders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer SupportAnders Soegaard NLP for Customer Support
Anders Soegaard NLP for Customer Support
 
Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018Stephen Alstrup infinit august 2018
Stephen Alstrup infinit august 2018
 
Innovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekterInnovation og værdiskabelse i it-projekter
Innovation og værdiskabelse i it-projekter
 
Rokoko infin it presentation
Rokoko infin it presentation Rokoko infin it presentation
Rokoko infin it presentation
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 

Modelling and Simulation of the response process for an emergency at the Great Belt bridge

  • 1. Experience Report: 
 Modelling and Simulation of 
 Railway Emergency Response Plans ITU ProSec, May 2nd, 2016 Søren Debois Joint work with Thomas Hildebrandt & Lene Sandberg
  • 2. Plan • Cyber-threats to Critical Infrastructure • The method • The Great Belt Bridge incident case • Collaborative mapping & simulation • Conclusions
  • 4. Cyber-physical attacks on 
 Critical Infrastructure • Operators (DSB, BaneDanmark) robust against physical incidents, including terrorism. • Operators IT system landscape very large and varied. • However, traditional “No-IT” approach to train operators still form foundations of day-to-day operations.
  • 5. The potential weakness • Cyber-physical assault: Combined physical & cyber attack. • Do emergency response plans hold up when both IT and physical infrastructure is physically attacked?
  • 6. How to investigate? • Extensive emergency response plans exist. Drills are performed regularly. • Let’s simulate! • But wait! Paper-based rehearsals don’t actually use ICT systems. How to simulate? • We need to simulate both the actions of drill participants and breakdowns of IT systems. • We have to be sure no-one “cheats” by accidentally assuming some system is functioning.
  • 7. Declarative Process Models • Formal model of emergency response process. • Give enormous freedom within a set of rules. • No-one cheats accidentally; the model won’t allow it.
  • 9. How do we try this out? 
 How do we get the process model?
  • 11. Collaborative mapping • Extensive documentation of emergency response procedures exists. • We sat down with domain experts from DSB & BaneDanmark and constructed a model based on that documentation.
  • 12.
  • 13. How do we know whether this model is meaningful?
  • 14. Collaborative simulation • Simulation gives the ability to explore un- anticipated paths and “what-if” scenarios. • Collaborative simulation brings a new level of realism, especially for coordination problems of emergency response scenarios.
  • 15. Simulation study, Metropol • At Metropol, students of Emergency and Risk Management as participants. • Tool provided insufficient overview. • Tool did not hide available and executed actions of other participants .
  • 16. Simulation study, DSB • At DSB, with DSB emergency response team lead and experienced train driver. • Recommendations: 
 Pictures, text, documentation in-tool.
  • 18. Conclusions • Collaborative mapping and simulation of emergency response processes is a viable means of studying ICT/Cyber-physical vulnerabilities. • DCR Formalism accessible to domain experts (with assistance) • DCR Tooling almost there.
  • 19. Future work • Integrating the IT system landscape into the model.