Identifying and Analyzing Implicit Interactions in Critical Infrastructure Systems

Similar documents
Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems 50th Hawaii International Conference on System Sciences

Managing the quantum risk to cybersecurity. Global Risk Institute. Michele Mosca 11 April 2016

The science behind these computers originates in

The quantum threat to cryptography

David Lanter PhD GISP. Information Security Risks and Controls of Public Geospatial Datasets July 17, 2014

Utilizing GIS to Identify and Mobilize Interdisciplinary Disaster Reconnaissance Research Teams: The SSEER and ISEEER Platforms

GIS and Remote Sensing Support for Evacuation Analysis

POLICY ISSUE (INFORMATION)

arxiv: v1 [cs.cr] 20 Dec 2012

Charting a Course for Coastal Climate Change Adaptation in Canada

Algorithmic Verification of Stability of Hybrid Systems

GOVERNMENT MAPPING WORKSHOP RECOVER Edmonton s Urban Wellness Plan Mapping Workshop December 4, 2017

Globally Harmonized Systems A Brave New OSHA HazComm

Introduction and Project Overview

Designing and Evaluating Generic Ontologies

Cascading Outages in Power Systems. Rui Yao

Internal Audit Report

Sea Level Rise Study Summary Town of South Bethany

America must act to protect its power grid

Model Checking. Boris Feigin March 9, University College London

PUBLIC HEALTH ASSOCIATION OF AUSTRALIA Strategic Plan

APPLICATIONS OF EARTHQUAKE HAZARD MAPS TO LAND-USE AND EMERGENCY PLANNING EXAMPLES FROM THE PORTLAND AREA

By Lillian Ntshwarisang Department of Meteorological Services Phone:

AGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:

EBS IT Meeting July 2016

The Underlying Semantics of Transition Systems

EXPLORING COMMON SOLUTIONS IN ARCTIC METEOROLOGY FINLAND S CHAIRMANSHIP OF THE ARCTIC COUNCIL

CHEMICAL AND EXPLOSIVE TERRORISM

Draft Model Memorandum of Understanding to promote voluntary cooperation between Government and Chemical Industry to enhance Precursors Chemicals

Reference: US Department of Energy.

Space Weather & Critical Infrastructures

International Air Safety & Climate change conference

Resolution 54/8 E/2011/28 E/CN.7/2011/15

Conceptual Modeling: How to Connect Architecture Overview and Design Details?

Establishment of Space Weather Information Service

Process Safety. Process Safety and Hazard Assessment Avoiding Incidents in the Lab and in the Plant

Dr. Steven Koch Director, NOAA National Severe Storms Laboratory Chair, WRN Workshop Executive Committee. Photo Credit: Associated Press

PUBLIC SAFETY POWER SHUTOFF POLICIES AND PROCEDURES

Frontiers of Risk and Reliability Engineering Research

Storage, Handling & Safe Use of Chemicals and Hazardous Materials

Improvised Chemical Devices, Chemical Security and the CWC

STORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS

Bounded Retransmission in Event-B CSP: a Case Study

C h a p t e r 5 : W o r k p l a c e H a z a r d o u s M a t e r i a l s I n f o r m a t i o n S y s t e m ( W H M I S )

The Swedish National Geodata Strategy and the Geodata Project

Role of Synchronized Measurements In Operation of Smart Grids

Vulnerability Assessment of Coastal Flooding Threats St. Joseph Bay to Apalachee Bay Coastline - Draft

EDF Feasibility and Hardware Accelerators

Perseverance. Experimentation. Knowledge.

Asynchronous Communication 2

Pricing of Cyber Insurance Contracts in a Network Model

Norwegian spatial data infrastructure supporting disaster risk management Norwegian Mapping Authority

Northrop Grumman Concept Paper

EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2016

Season Finale: Which one is better?

Application of GIS Technology in Watershed-based Management and Decision Making

Development and Field Deployment of a Novel AUV Gravimeter

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

An Algebra of Hybrid Systems

Mother Nature Strikes Back:

Networked Embedded Systems WS 2016/17

Frontiers of Risk and Reliability Engineering Research

SFWR ENG 2FA3: Discrete Mathematics and Logic II

Quantum Computing: What s the deal? Michele Mosca ICPM Discussion Forum 4 June 2017

2018 Project Prioritization and Budgeting Process

TOP SECRET//SI//REL TO USA, AUS, CAN, GBR, NZL

STORAGE, HANDLING & SAFE USE OF CHEMICALS AND HAZARDOUS MATERIALS

EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014

Geographic Information Systems(GIS)

Hobart and William Smith Colleges. Hazard Communication Program

Scientific Integrity: A crystallographic perspective

CIS 4930/6930: Principles of Cyber-Physical Systems

Winter Preparation for Severe Weather Events

The Quantum Threat to Cybersecurity (for CxOs)

D I G I T A L S U P P L Y C H A I N S E C U R I T Y

TECHNICAL WORKING GROUP ITWG GUIDELINE ON IN-FIELD APPLICATIONS OF HIGH- RESOLUTION GAMMA SPECTROMETRY FOR ANALYSIS OF SPECIAL NUCLEAR MATERIAL

Logic Model Checking

Canada s Experience with Chemicals Assessment and Management and its Application to Nanomaterials

Lecture 2: Introduction to Uncertainty

An Introduction to NatureServe Linking Conservation and Transportation Planning Phoenix, Arizona November 8 & 9, 2006

2014: Statewide Perspectives on Water Tuolumne County Tour. July 21-22, 2014 Timothy Quinn, ACWA Executive Director

Outline National legislative & policy context Regional history with ESSIM ESSIM Evaluation Phase Government Integration via RCCOM Regional ICOM Framew

GHS Safety Data Sheets & Labeling System

RURAL-URBAN PARTNERSHIPS: AN INTEGRATED APPROACH TO ECONOMIC DEVELOPMENT

Marine Spatial Planning, a Norwegian user case NSHC33

The purpose of this report is to recommend a Geographic Information System (GIS) Strategy for the Town of Richmond Hill.

PARAMETRIC STUDY OF THE STRUCTURAL CAPACITY OF REINFORCED CONCRETE CONTAINMENT SUBJECTED TO LARGE COMMERICAL AIRCRFAT IMPACT

New Land Cover & Land Use Data for the Chesapeake Bay Watershed

Key Steps for Assessing Mission Critical Data for An ebook by Geo-Comm, Inc.

EBA Engineering Consultants Ltd. Creating and Delivering Better Solutions

Flood Map. National Dataset User Guide

Probabilistic Risk Assessment

Controlo Switched Systems: Mixing Logic with Differential Equations. João P. Hespanha. University of California at Santa Barbara.

Opportunities and Priorities in a New Era for Weather and Climate Services

Hazard Communica tion

Urban Climate Resilience

Trip Distribution Model for Flood Disaster Evacuation Operation

Developments in Science and Technology: Autonomous Systems and Artificial Intelligence in Chemistry

Quantum Wireless Sensor Networks

CHAPTER 3 RESEARCH METHODOLOGY

Transcription:

Identifying and in Critical Infrastructure Systems Jason Jaskolka Collaborator: John Villasenor (UCLA) Department of Systems and Computer Engineering Carleton University, Ottawa, ON, Canada jaskolka@sce.carleton.ca January 25, 2018 Jason Jaskolka CIRI Webinar Series 1 / 35

Acknowledgement & Disclaimer Acknowledgement This material is based upon work supported by the U.S. Department of Homeland Security under Grant Award Number, 2015-ST-061-CIRC01. Disclaimer The views and conclusions contained in this document are those of the authors and should not be interpreted as necessarily representing the official policies, either expressed or implied, of the U.S. Department of Homeland Security. Jason Jaskolka CIRI Webinar Series 2 / 35

Introduction Critical Infrastructure Cybersecurity Challenges in Critical Infrastructure Implicit Component Interactions Research Problem Critical Infrastructure Jason Jaskolka CIRI Webinar Series 3 / 35

Critical Infrastructure Cybersecurity Challenges in Critical Infrastructure Implicit Component Interactions Research Problem Cybersecurity Challenges in Critical Infrastructure Ubiquitous and pervasive Large, complex, and rapidly growing Mix of legacy systems and new technologies Numerous components or agents and even more interactions, some of which may be: Unfamiliar, unplanned, or unexpected Not visible or not immediately comprehensible } Implicit Interactions Software/Hardware from third-party suppliers Cyber-attackers are far more sophisticated and have access to far more powerful tools than in the past Jason Jaskolka CIRI Webinar Series 4 / 35

Implicit Interactions Introduction Critical Infrastructure Cybersecurity Challenges in Critical Infrastructure Implicit Component Interactions Research Problem Definition (Implicit Interaction) An interaction among system components that may be unfamiliar, unplanned, or unexpected, and either not visible or not immediately comprehensible by the system designers. Can indicate unforeseen design flaws allowing for these interactions Constitute linkages of which designers are generally unaware = security vulnerability Can be exploited to mount cyber-attacks at a later time Potential for unexpected system behaviors Example: Gain unauthorized access to information Jason Jaskolka CIRI Webinar Series 5 / 35

Research Problem Introduction Critical Infrastructure Cybersecurity Challenges in Critical Infrastructure Implicit Component Interactions Research Problem Assuring safety, security, and reliability of critical infrastructure systems is becoming a top priority Shortcomings in development of formal methods and tools for determining whether such systems are protected from cyber-threats [Bennett 2015] Ability to detect undesirable interactions among system components is needed [Jackson and Ferris 2012] Research Challenge Develop a rigorous (formal methods-based) approach to better understand, identify, analyze, and mitigate implicit interactions in critical infrastructure systems. Jason Jaskolka CIRI Webinar Series 6 / 35

Why Formal Methods? Introduction Critical Infrastructure Cybersecurity Challenges in Critical Infrastructure Implicit Component Interactions Research Problem According to the DHS Cybersecurity Research Roadmap [DHS 2009] Formal verification and other analytic tools that can scale will be critical to building systems with significantly higher assurance than today s systems. In particular, theories are needed to support analytic tools that can facilitate the prediction of trustworthiness, inclusion modeling, simulation, and formal methods. The potential utility of formal methods has increased significantly in the past four decades and needs to be considered whenever it can be demonstrably effective. Jason Jaskolka CIRI Webinar Series 7 / 35

Proposed Approach for Solving the Problem Research Goal Develop an analysis framework to enhance our understanding of how and why implicit interactions can exist and to identify system deficiencies in critical components to enable a better assessment of risks being taken by using such components to build critical infrastructure systems. 1 Model critical infrastructure systems using a mathematical framework 2 Formulate and identify the existence of implicit interactions 3 Analyze existing implicit interactions 4 Mitigate the existence of and/or minimize the threat posed by implicit interactions Jason Jaskolka CIRI Webinar Series 8 / 35

Illustrative Example: Manufacturing Cell Jason Jaskolka CIRI Webinar Series 9 / 35

Illustrative Example: Manufacturing Cell Jason Jaskolka CIRI Webinar Series 9 / 35

Illustrative Example: Manufacturing Cell Control/Coordination Agent Storage Agent Handling Agent Processing Agent Jason Jaskolka CIRI Webinar Series 9 / 35

Illustrative Example: Manufacturing Cell (1) start (13) end Control Agent (C) (9) state (2) load (12) processed (3) loaded (7) unloaded (8) setup (12) done Storage Agent (S) (5) status (9) status (4) prepare (11) process (10) ready Processing Agent (P) (6) unload Handling Agent (H) (11) process (9) material Jason Jaskolka CIRI Webinar Series 10 / 35

Approach for Solving the Problem 1 Model critical infrastructure systems using a mathematical framework 2 Formulate and identify the existence of implicit interactions 3 Analyze existing implicit interactions 4 Mitigate the existence of and/or minimize the threat posed by implicit interactions Jason Jaskolka CIRI Webinar Series 11 / 35

An Algebraic Modeling Framework Communicating Concurrent Kleene Algebra (C 2 KA) Formalism for modeling distributed multi-agent systems Captures communication and concurrency of agents at an abstract algebraic level Expresses influence of stimuli on agent behavior in open systems as well as communication through shared environments Three levels of specification 1 Stimulus-Response Specification 2 Abstract Behavior Specification 3 Concrete Behavior Specification Jason Jaskolka CIRI Webinar Series 12 / 35

Communicating Concurrent Kleene Algebra (C 2 KA) Definition (C 2 KA) A Communicating Concurrent Kleene Algebra (C 2 KA) is a system ( ) ( ) S, K, where S = S,,, d, n is a stimulus structure K = (K, +,, ;, *, ; ), 0, 1 is a CKA ) (S K, + is a unitary and zero-preserving left S-semimodule with next behavior mapping : S K K ( ) S K, is a unitary and zero-preserving right K-semimodule with next stimulus mapping λ : S K S and where the following axioms are satisfied for all a, b, c K and s, t S: 1 s (a ; b) = (s a) ; ( λ(s, a) b 2 a K c b = 1 (s a) ; ( λ(s, c) b 3 λ(s t, a) = λ ( 4 s = d s 1 = 1 s, (t a) 5 a = 0 λ(n, a) = n ) ) λ(t, a) ) = 0 Jason Jaskolka CIRI Webinar Series 13 / 35

Agent Specifications Illustrative Example: Manufacturing Cell Table: Stimulus-response specification of the Control Agent C start load loaded prepare done unload unloaded setup ready process processed end idle idle idle prep idle idle idle idle idle idle idle idle idle prep prep prep prep prep prep prep init prep prep prep prep prep init init init init init init init init init init proc init init proc proc proc proc proc proc proc proc proc proc proc idle proc λ start load loaded prepare done unload unloaded setup ready process processed end idle load n prepare n n n n n n n n n prep n n n n n n setup n n n n n init n n n n n n n n n done n n proc n n n n n n n n n n end n Control Agent C idle + prep + init + proc Storage Agent S empty + full Handling Agent H wait + move Processing Agent P stby + set + work Figure: Abstract behavior specification of the manufacturing cell agents Jason Jaskolka CIRI Webinar Series 14 / 35

Agent Specifications Illustrative Example: Manufacturing Cell C S H def idle = state := 0 def prep = state := 1 init def = state := 2 proc def = state := 3 { empty def = status := 0 def full = status := 1 wait def = skip def move = if (status = 1) material := 1 (status = 1) material := 0 fi P stby set work def = skip def = if (material = 1 state = 2 status = 0) ready := 1 (material = 1 state = 2 status = 0) ready := 0 fi def = if (ready = 1) part := PROCESS() (ready = 1) part := null fi Figure: Concrete behavior specification of the manufacturing cell agents Jason Jaskolka CIRI Webinar Series 15 / 35

Approach for Solving the Problem 1 Model critical infrastructure systems using a mathematical framework Communicating Concurrent Kleene Algebra (C 2 KA) 2 Formulate and identify the existence of implicit interactions 3 Analyze existing implicit interactions 4 Mitigate the existence of and/or minimize the threat posed by implicit interactions Jason Jaskolka CIRI Webinar Series 16 / 35

Intended System Interactions (1) start (13) end Control Agent (C) (9) state (2) load (12) processed (3) loaded (7) unloaded (8) setup (12) done Storage Agent (S) (5) status (9) status (4) prepare (11) process (10) ready Processing Agent (P) (6) unload Handling Agent (H) (11) process (9) material P intended denotes the set of intended system interactions Jason Jaskolka CIRI Webinar Series 17 / 35

Illustrative Example: Manufacturing Cell Intended System Interactions P C C S C H S C P H C P P intended = { C S S S C S H S S S C S P S H S P S C, C S S S C S H S S S C S P S H S C S P, C S S E H E P S H S C S P, C S S E H E P S H S P S C,... C S S S C S H S S E P S H S C S P, C S S S C S H S S E P S H S P S C, C S S S C S H S S S C E P S H S C S P, C S S S C S H S S S C E P S H S P S C } Jason Jaskolka CIRI Webinar Series 18 / 35

Formulating Existence of Implicit Interactions Potential for Communication via Stimuli (A + S B) A has the potential for communication via stimuli with B if and only if ( n n 1 : A n S B ) where A n S B ( ) C C A C A C B : A (n 1) ( S ) C C S B A S B s, t s, t S b t S λ(s, a) : t b b Definition (Existence of Implicit Interactions) An implicit interaction exists in a system formed by a set A of agents, if and only if for any two agents A, B A with A B: ( p p = (A + B) : (q q P intended : SubPath(p, q) ) ) where SubPath(p, q) is a predicate indicating that p is a subpath of q. Jason Jaskolka CIRI Webinar Series 19 / 35

Identifying Implicit Interactions 1 Determine the potential communication paths that exist from the system specification Example: Consider the manufacturing cell: $ pfc system agentp agents P ~> S: True P ->S H ->S C ->S S P ->S C ->S S P ->S C ->S H ->S S P ->S H ->S S $ pfc system agenth agentc H ~> C: True H ->S C H ->S S ->E P ->S C H ->E P ->S C H ->S P ->S C H ->S S ->S C Storage Agent (S) Control Agent (C) Handling Agent (H) Processing Agent (P) Jason Jaskolka CIRI Webinar Series 20 / 35

Identifying Implicit Interactions 2 Determine if a potential communication path is an implicit interaction Example: Consider the following potential communication paths: H S S S C and P S C S S P C C S C H S C P H C P Jason Jaskolka CIRI Webinar Series 21 / 35

Identifying Implicit Interactions Control Agent (C) Storage Agent (S) Processing Agent (P) Handling Agent (H) C S C H S C P H P C C P Jason Jaskolka CIRI Webinar Series 22 / 35

Approach for Solving the Problem 1 Model critical infrastructure systems using a mathematical framework Communicating Concurrent Kleene Algebra (C 2 KA) 2 Formulate and identify the existence of implicit interactions Potential for Communication 3 Analyze existing implicit interactions 4 Mitigate the existence of and/or minimize the threat posed by implicit interactions Jason Jaskolka CIRI Webinar Series 23 / 35

Provide a means for determining the interactions that have the potential to most negatively impact the system Severity: a measure of the relative non-overlap between a possible interaction with the intended interactions of a system less overlap = higher severity = more unexpected Exploitability: a measure of the fraction of ways that a source agent can influence the behavior of its adjacent agents to eventually influence the behavior of the sink agent higher exploitability = more ways to influence behaviors Jason Jaskolka CIRI Webinar Series 24 / 35

Sample Tool Output Identification & Severity Introduction Attack Scenarios & Exploitability ------------------------ ALL PATHS: S ~> C ------------------------ SEVERITY = 0.00 S ->E P ->S H ->S C SEVERITY = 0.50 S ->E H ->S C SEVERITY = 0.50 S ->E P ->S C SEVERITY = 0.33 S ->E H ->E P ->S C SEVERITY = 0.33 S ->E H ->S P ->S C SEVERITY = 0.00 S ->S C ------------------------ IMPLICIT PATHS: S ~> C ------------------------ S ->E H ->S C S ->E P ->S C S ->E H ->E P ->S C S ->E H ->S P ->S C ------------------------ ALL PATHS: P ~> S ------------------------ SEVERITY = 0.33 P ->S H ->S C ->S S SEVERITY = 0.50 P ->S C ->S S SEVERITY = 0.33 P ->S C ->S H ->S S SEVERITY = 0.50 P ->S H ->S S ------------------------ IMPLICIT PATHS: P ~> S ------------------------ P ->S H ->S C ->S S P ->S C ->S S P ->S C ->S H ->S S P ->S H ->S S IMPLICIT PATH = S ->E H ->S C ATTACK SCENARIOS = {status} EXPLOITABILITY = 1.00 IMPLICIT PATH = S ->E P ->S C ATTACK SCENARIOS = {material, state, status} EXPLOITABILITY = 0.75 IMPLICIT PATH = S ->E H ->E P ->S C ATTACK SCENARIOS = {status} EXPLOITABILITY = 0.75 IMPLICIT PATH = S ->E H ->S P ->S C ATTACK SCENARIOS = {status} EXPLOITABILITY = 0.25... IMPLICIT PATH = P ->S C ->S S ATTACK SCENARIOS = {start} EXPLOITABILITY = 0.20 IMPLICIT PATH = H ->E P ->S C ->S S ATTACK SCENARIOS = {} EXPLOITABILITY = 0.00 Jason Jaskolka CIRI Webinar Series 25 / 35

Experimental Results Introduction For the manufacturing cell system: 29 of the 65 total interactions are identified as implicit interactions Result of the potential for out-of-sequence messages or reads/writes from system agents Due to cyber-attack or failure Demonstrates hidden complexity and coupling among agents Potential for unexpected system behaviors Although the example is presented in the context of manufacturing, the analogous communication and dependencies are found in nearly all complex distributed systems Jason Jaskolka CIRI Webinar Series 26 / 35

Approach for Solving the Problem 1 Model critical infrastructure systems using a mathematical framework Communicating Concurrent Kleene Algebra (C 2 KA) 2 Formulate and identify the existence of implicit interactions Potential for Communication 3 Analyze existing implicit interactions Classifying and Measuring Severity and Exploitability 4 Mitigate the existence of and/or minimize the threat posed by implicit interactions Jason Jaskolka CIRI Webinar Series 27 / 35

A Comment on 1 Preemptive Approaches Eliminate potential for communication while maintaining overall system functionality Introduce intermediate agents or modify agent behaviors 2 Reactive Approaches Monitor communication and behavior to find suspicious activity Jason Jaskolka CIRI Webinar Series 28 / 35

Impact of this Research Impact & Future Research Directions Related Publications and References Questions Enhances the understanding of the hidden complexity and coupling in critical infrastructure systems Formal foundation upon which mitigation approaches can be developed Basis for developing guidelines for designing and implementing critical infrastructure systems that are resilient to cyber-threats There is still more to be done! Jason Jaskolka CIRI Webinar Series 29 / 35

Where Do We Go From Here? Impact & Future Research Directions Related Publications and References Questions Refinements to classification and measurement of severity and exploitability Study impact of implicit interactions through simulation Further articulate mitigation approaches Validate and evaluate our approaches in real-world applications Working with USTRANSCOM on analyzing a case study system Obtain useful direction and feedback for transitioning our foundational research into practical outcomes from the project Develop software tools to automate the specification, identification, and analysis of critical infrastructure systems based on our mathematical foundations Jason Jaskolka CIRI Webinar Series 30 / 35

Introduction Impact & Future Research Directions Related Publications and References Questions Implicit interactions can pose a serious cyber-threat to critical infrastructure systems Aids in addressing potential security vulnerabilities at early stages of system development Provides vital information that can drive decisions on where and how to spend valuable resources in mitigation efforts Community engagement can enable contributions to emerging challenges in critical infrastructure cybersecurity Jason Jaskolka CIRI Webinar Series 31 / 35

Related Publications and References Impact & Future Research Directions Related Publications and References Questions J. Jaskolka and J. Villasenor. An Algebraic Approach for Simulating and Analyzing Distributed Systems. ACM Transactions on Modeling and Computer Simulation, (Under Review). J. Jaskolka and J. Villasenor. Evaluating the Exploitability of Implicit Interactions in Distributed Cyber-Physical Systems. ACM Transactions on Cyber-Physical Systems, (Under Review). J. Jaskolka and J. Villasenor. An Approach for Identifying and in Distributed Systems. IEEE Transactions on Reliability, 66(2):529-546, June 2017. J. Jaskolka and J. Villasenor. Identifying Implicit Component Interactions in Distributed Cyber-Physical Systems. Proceedings of HICSS-50, 5988 5997, January 2017. J. Jaskolka. On the Modelling, Analysis, and Mitigation of Distributed Covert Channels. Ph.D. Thesis, McMaster University, March 2015. Jason Jaskolka CIRI Webinar Series 32 / 35

Related Publications and References Impact & Future Research Directions Related Publications and References Questions J. Jaskolka and R. Khedri. A Formulation of the Potential for Communication Condition using C 2 KA. In A. Peron and C. Piazza, editors, Proceedings of GandALF 2014, volume 161 of Electronic Proceedings in Theoretical Computer Science, 161 174. September 2014. J. Jaskolka, R. Khedri, and Q. Zhang. Endowing Concurrent Kleene Algebra with Communication Actions. In P. Höfner, P. Jipsen, W. Kahl, and M. E. Müller, editors, Proceedings of RAMiCS 2014, volume 8428 of Lecture Notes in Computer Science, 19 36. April 2014. C. Bennett. Feds Lack Method to Grade Critical Infrastructure Cybersecurity. The Hill (Online), November 2015. S. Jackson and T. L. J. Ferris. Infrastructure Resilience: Past, Present, and Future. The CIP Report, 11(6):6 13, December 2012. U.S.A. Department of Homeland Security. A Roadmap for Cybersecurity Research. Department of Homeland Security Science and Technology Directorate, November 2009. Jason Jaskolka CIRI Webinar Series 33 / 35

Impact & Future Research Directions Related Publications and References Questions Questions? Jason Jaskolka CIRI Webinar Series 34 / 35

Impact & Future Research Directions Related Publications and References Questions Thank You Jason Jaskolka CIRI Webinar Series 35 / 35