transportation, healthcare, and agriculture.
Ultimately, the evolving nature of cyber technology
calls for a new way of performing risk management;
one that considers the impact of cyber risks on safety.
2 BACKGROUND
There has been some debate regarding the difference
between security and safety. Merriam-Webster
defines security as “the state of being protected or
safe from harm.” Similarly, safety is defined as
“freedom from harm or danger” (Merriam-Webster,
n.d.). In other languages, such as Norwegian, there is
no difference between the two English words as the
terms are used interchangeably (Albrechtsen, 2003).
Researchers at a Norwegian university attempt to
distinguish security from safety by associating one
with deliberate harm and one with unintentional
hazards, respectively (Albrechtsen, 2003). In my
opinion, the difference is in the type of impact.
Perceptively, safety focuses on prevention of injury,
adverse health effects, and wellbeing of people.
Security focuses on preventing the loss of tangible
assets; whether information, buildings, functions, etc.
One could argue that people are also tangible assets.
While a valid argument, the loss of people from this
perspective is usually in consideration of loss of
function or value provided by people.
In the context of cyber technology, security is
often described as the preservation of confidentiality,
integrity, and availability of information. This
fundamental triad defines the core needs of
information and systems; Needs that, if impacted,
compromise information security. Organizations
concerned with safety, aim to prevent accidents and
provide protection from physical, mental, or
emotional injury. These organizations need an
effective way to map these information needs toward
safety.
3 ILLUSTRATION OF SAFETY
IMPACT
Cyber security risks have raised safety concerns in
several industries. For example, can e-enabled
pacemakers leave patients vulnerable to cyber-
attacks? Where e-enabled aircraft systems are
segmented using firewalls, can these be bypassed by
malicious intenders to execute unauthorized
commands? Can nuclear weapons with remote trigger
capabilities be activated? Each of these scenarios
employs cyber technology for convenience, but also
has the potential to gravely impact safety. There is
work to be done when it comes to considering these
trade-offs during risk management. Given the
growing global concern of cyber risks to aircraft and
the air traffic management system (International Civil
Aviation Organization, 2014), the aviation sector will
be used as an example of how cyber risks can impact
safety.
The aviation sector is both security and safety
intensive. The greater purpose of investing in civil
aviation security is to protect people from any harm
brought on, whether intentional or unintentional, by
individuals with access to aviation systems. With
good reason, airport security was heightened after the
successful attacks of 9/11 to prevent an attack of that
nature from reoccurring. More than a decade later,
aircraft still remains an attractive target to malicious
intenders seeking to “achieve surprise and maximize
the destructive effect” (Department of Homeland
Security, 2002) because these attacks result in loss of
life, cause mass grief and terror, and decrease
confidence in the aviation sector. As aircraft are
becoming more comparable to a complex information
systems, cyber-attacks in this sector can be targeted,
not only for traditional financial or competitive gain,
but to negatively impact safety and cause loss of life.
Malicious attackers may see this as an innovative
attack vector that airport security does not address.
The reliance of critical aviation components on cyber
technology creates exploitable vulnerabilities if not
adequately managed.
Though theoretical demos, as well as real world
events, have been documented involving cyber
threats to aviation, (Storm, 2013), (Soperus, 2009),
(Zetter, 2015), (Costin and Francillon, 2012) there
have been conflicting views amongst aviation experts
on the viability of successful cyber-attacks in
aviation. The International Civil Aviation
Organization released a working paper in 2014
reporting on risk assessment of cyber-attack against
the air traffic management system (International Civil
Aviation Organization, 2014). As an example, the
report discloses that threats such as the disruption of
aircraft separation data feeds could marginally
increase the risk of aircraft collision. The report also
states, “The ATC system has many internal checks
and balances that make it very unlikely that a hacker
can seriously compromise controlled traffic in
controlled airspace. Most of the claims…have been
made in ignorance of these system checks”
(International Civil Aviation Organization, 2014). In
order to make a risk management decision, in this
case what appears to be “accepting the risk,” there