Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities

Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities

Author: Bart Kemper

Publisher: SAE International

Published: 2023-11-22

Total Pages: 28

ISBN-13: 1468607154

DOWNLOAD EBOOK

Traditional physical infrastructure increasingly relies upon software. Yet, 75% of software projects fail in budget by 46% and schedule by 82%. While other systems generally have a “responsible-in-charge” (RIC) professional, the implementation of a similar system of accountability in software is not settled. This is a major concern, as the consequences of software failure can be a matter of life-or-death. Further, there has been a 742% average annual increase in software supply chain attacks on increasingly used open-source software over the past three years, which can cost up to millions of dollars per incident. Developing the Role of the System Software Integrator to Mitigate Digital Infrastructure Vulnerabilities discusses the verification, validation, and uncertainty quantification needed to vet systems before implementation and the continued maintenance measures required over the lifespan of software-integrated assets. It also proposes a certified System Software Integrator role that would be responsible for public safety in traditional infrastructure. Click here to access The Mobility Frontier: Cybersecurity and Trust Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2023028


The State of Systems Engineering Adoption in the Automotive Industry

The State of Systems Engineering Adoption in the Automotive Industry

Author: Anne O'Neil

Publisher: SAE International

Published: 2023-12-12

Total Pages: 28

ISBN-13: 1468607200

DOWNLOAD EBOOK

Growing levels of complexity and integration coupled with the current period of automotive innovation are necessitating the adoption of Systems approaches and Systems Engineering (SE) practices. For the automotive industry to navigate this transformative period successfully, we need Systems approaches to bridge all elements of vehicle development and engage and align all parts of the business. Yet, the industry has lagged in comprehensive SE adoption, persistently retaining organizational silos and outdated paradigms for vehicle design development teams. It still structures itself around physical components of vehicles, despite having the significant majority of functionality and features derived from software and communications. The State of Systems Engineering Adoption in the Automotive Industry captures the unresolved aspects of more comprehensively adopting Systems approaches and practices and seeks to enable industry leaders to more effectively navigate the complexity and integration challenges faced during this unprecedented period of disruptive innovation and change. Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2023030


Systems Design Engineering: A Holistic Requirements-led Approach to Concept Design

Systems Design Engineering: A Holistic Requirements-led Approach to Concept Design

Author: David Paul Genter

Publisher: SAE International

Published: 2024-10-21

Total Pages: 22

ISBN-13: 1468608878

DOWNLOAD EBOOK

Many organizations are falling far short of achieving the lifecycle potential of their new product designs. One major source of this suboptimal business performance stems from underleveraging key Systems Engineering and Design Engineering principles in the early phases of the design process. If these are being poorly applied, the following will likely occur: Inefficient use of engineering (and other cross-functional) resources Unnecessarily high product development costs Delayed time-to-market Subpar launch quality Poor system-level safety Suboptimal lifecycle sustainability-related performance Compromised design innovation This report addresses these challenges and articulates how an integrated approach of “Systems Design Engineering” provides nonburdensome and quickly applied methods for overcoming these shortcomings, placing a dedicated focus on the three high-level principles that govern lifecycle product design success. Excellent and efficient performance against each of them is needed to achieve a new product’s lifecycle goals. Holistically understanding the needs and opportunities of a system Efficient development of system-level design concepts with best-in-class potential System-level design concept selection, including effective risk mitigation Click here to access the full SAE EDGETM Research Report portfolio. 9781468608878 9781468608885 https://doi.org/10.4271/EPR2024024


Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles

Author: Qadeer Ahmed

Publisher: SAE International

Published: 2024-04-22

Total Pages: 32

ISBN-13: 1468608150

DOWNLOAD EBOOK

Given the rapid advancements in engineering and technology, it is anticipated that connected and automated vehicles (CAVs) will soon become prominent in our daily lives. This development has a vast potential to change the socio-technical perception of public, personal, and freight transportation. The potential benefits to society include reduced driving risks due to human errors, increased mobility, and overall productivity of autonomous vehicle consumers. On the other hand, the potential risks associated with CAV deployment related to technical vulnerabilities are safety and cybersecurity issues that may arise from flawed hardware and software. Cybersecurity and Digital Trust Issues in Connected and Automated Vehicles elaborates on these topics as unsettled cybersecurity and digital trust issues in CAVs and follows with recommendations to fill in the gaps in this evolving field. This report also highlights the importance of establishing robust cybersecurity protocols and fostering digital trust in these vehicles to ensure safe and secure deployment in our modern transportation system. Click here to access The Mobility Frontier: Cybersecurity and Trust Click here to access the full SAE EDGETM Research Report portfolio. https://doi.org/10.4271/EPR2024009


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.


Computers at Risk

Computers at Risk

Author: National Research Council

Publisher: National Academies Press

Published: 1990-02-01

Total Pages: 320

ISBN-13: 0309043883

DOWNLOAD EBOOK

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.


Security in Development: The IBM Secure Engineering Framework

Security in Development: The IBM Secure Engineering Framework

Author: Warren Grunbok

Publisher: IBM Redbooks

Published: 2018-12-17

Total Pages: 32

ISBN-13: 0738457175

DOWNLOAD EBOOK

IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads. This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page. The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company. In this IBM RedguideTM publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered. IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.


Construction 4.0

Construction 4.0

Author: Anil Sawhney

Publisher: Routledge

Published: 2020-02-06

Total Pages: 527

ISBN-13: 0429675119

DOWNLOAD EBOOK

Modelled on the concept of Industry 4.0, the idea of Construction 4.0 is based on a confluence of trends and technologies that promise to reshape the way built environment assets are designed, constructed, and operated. With the pervasive use of Building Information Modelling (BIM), lean principles, digital technologies, and offsite construction, the industry is at the cusp of this transformation. The critical challenge is the fragmented state of teaching, research, and professional practice in the built environment sector. This handbook aims to overcome this fragmentation by describing Construction 4.0 in the context of its current state, emerging trends and technologies, and the people and process issues that surround the coming transformation. Construction 4.0 is a framework that is a confluence and convergence of the following broad themes discussed in this book: Industrial production (prefabrication, 3D printing and assembly, offsite manufacture) Cyber-physical systems (actuators, sensors, IoT, robots, cobots, drones) Digital and computing technologies (BIM, video and laser scanning, AI and cloud computing, big data and data analytics, reality capture, Blockchain, simulation, augmented reality, data standards and interoperability, and vertical and horizontal integration) The aim of this handbook is to describe the Construction 4.0 framework and consequently highlight the resultant processes and practices that allow us to plan, design, deliver, and operate built environment assets more effectively and efficiently by focusing on the physical-to-digital transformation and then digital-to-physical transformation. This book is essential reading for all built environment and AEC stakeholders who need to get to grips with the technological transformations currently shaping their industry, research, and teaching.


Effective Vulnerability Management

Effective Vulnerability Management

Author: Chris Hughes

Publisher: John Wiley & Sons

Published: 2024-04-30

Total Pages: 192

ISBN-13: 1394221215

DOWNLOAD EBOOK

Infuse efficiency into risk mitigation practices by optimizing resource use with the latest best practices in vulnerability management Organizations spend tremendous time and resources addressing vulnerabilities to their technology, software, and organizations. But are those time and resources well spent? Often, the answer is no, because we rely on outdated practices and inefficient, scattershot approaches. Effective Vulnerability Management takes a fresh look at a core component of cybersecurity, revealing the practices, processes, and tools that can enable today's organizations to mitigate risk efficiently and expediently in the era of Cloud, DevSecOps and Zero Trust. Every organization now relies on third-party software and services, ever-changing cloud technologies, and business practices that introduce tremendous potential for risk, requiring constant vigilance. It's more crucial than ever for organizations to successfully minimize the risk to the rest of the organization's success. This book describes the assessment, planning, monitoring, and resource allocation tasks each company must undertake for successful vulnerability management. And it enables readers to do away with unnecessary steps, streamlining the process of securing organizational data and operations. It also covers key emerging domains such as software supply chain security and human factors in cybersecurity. Learn the important difference between asset management, patch management, and vulnerability management and how they need to function cohesively Build a real-time understanding of risk through secure configuration and continuous monitoring Implement best practices like vulnerability scoring, prioritization and design interactions to reduce risks from human psychology and behaviors Discover new types of attacks like vulnerability chaining, and find out how to secure your assets against them Effective Vulnerability Management is a new and essential volume for executives, risk program leaders, engineers, systems administrators, and anyone involved in managing systems and software in our modern digitally-driven society.


Countering Cyber Sabotage

Countering Cyber Sabotage

Author: Andrew A. Bochman

Publisher: CRC Press

Published: 2021-01-20

Total Pages: 232

ISBN-13: 1000292975

DOWNLOAD EBOOK

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.