Skip to main content

“Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar

  • Conference paper
  • First Online:
Critical Information Infrastructures Security (CRITIS 2015)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9578))

Abstract

The water infrastructure is critical to human life, but little attention has been paid to the nuances of the water industry. Without such attention, evaluating security innovation in this domain without compromising the productivity goals when delivering water services is difficult. This paper proposes four nuances that need to be incorporated into a representative specification exemplar for the water industry; these provided input to the exemplar based on a fictional water company.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Slay, J., Miller, M.: Lessons learned from the maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP Advances in Information and Communication Technology, vol. 253, pp. 73–82. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Eliades, D.G., Polycarpou, M.M.: Security of water infrastructure systems. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 360–367. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  3. Van Leuven, L.J.: Water/wastewater infrastructure security: threats and vulnerabilities. In: Clark, R.M., Hakim, S., Ostfeld, A. (eds.) Handbook of Water and Wastewater Systems Protection. Springer, Heidelberg (2011)

    Google Scholar 

  4. Van Eeten, M., Nieuwenhuijs, A., Luiijf, E., Klaver, M., Cruz, E.: The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports. Public Adm. 89(2), 381–400 (2011)

    Article  Google Scholar 

  5. Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. IJCIS 9(1/2), 93–110 (2013)

    Article  Google Scholar 

  6. Feather, M.S., Fickas, S., Finkelstein, A., van Lamsweerde, A.: Requirements and specification exemplars. Autom. Softw. Eng. 4(4), 419–438 (1997)

    Article  Google Scholar 

  7. Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Moore, T., Pym, D.J., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 55–66. Springer, Heidelbrg (2010)

    Chapter  Google Scholar 

  8. Faily, S., Fléchais, I.: Towards tool-support for usable secure requirements engineering with CAIRIS. Int. J. Secur. Softw. Eng. 1(3), 56–70 (2010)

    Article  Google Scholar 

  9. Faily, S., Fléchais, I.: User-centered information security policy development in a post-stuxnet world. In: Proceedings of the 6th International Conference on Availability, Reliability and Security, pp. 716–721 (2011)

    Google Scholar 

  10. Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shamal Faily .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Faily, S., Stergiopoulos, G., Katos, V., Gritzalis, D. (2016). “Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science(), vol 9578. Springer, Cham. https://doi.org/10.1007/978-3-319-33331-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-33331-1_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-33330-4

  • Online ISBN: 978-3-319-33331-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics