Abstract
The water infrastructure is critical to human life, but little attention has been paid to the nuances of the water industry. Without such attention, evaluating security innovation in this domain without compromising the productivity goals when delivering water services is difficult. This paper proposes four nuances that need to be incorporated into a representative specification exemplar for the water industry; these provided input to the exemplar based on a fictional water company.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Slay, J., Miller, M.: Lessons learned from the maroochy water breach. In: Goetz, E., Shenoi, S. (eds.) Critical Infrastructure Protection. IFIP Advances in Information and Communication Technology, vol. 253, pp. 73–82. Springer, Heidelberg (2008)
Eliades, D.G., Polycarpou, M.M.: Security of water infrastructure systems. In: Setola, R., Geretshuber, S. (eds.) CRITIS 2008. LNCS, vol. 5508, pp. 360–367. Springer, Heidelberg (2009)
Van Leuven, L.J.: Water/wastewater infrastructure security: threats and vulnerabilities. In: Clark, R.M., Hakim, S., Ostfeld, A. (eds.) Handbook of Water and Wastewater Systems Protection. Springer, Heidelberg (2011)
Van Eeten, M., Nieuwenhuijs, A., Luiijf, E., Klaver, M., Cruz, E.: The state and the threat of cascading failure across critical infrastructures: the implications of empirical evidence from media incident reports. Public Adm. 89(2), 381–400 (2011)
Kotzanikolaou, P., Theoharidou, M., Gritzalis, D.: Assessing n-order dependencies between critical infrastructures. IJCIS 9(1/2), 93–110 (2013)
Feather, M.S., Fickas, S., Finkelstein, A., van Lamsweerde, A.: Requirements and specification exemplars. Autom. Softw. Eng. 4(4), 419–438 (1997)
Anderson, R., Fuloria, S.: Security economics and critical national infrastructure. In: Moore, T., Pym, D.J., Ioannidis, C. (eds.) Economics of Information Security and Privacy, pp. 55–66. Springer, Heidelbrg (2010)
Faily, S., Fléchais, I.: Towards tool-support for usable secure requirements engineering with CAIRIS. Int. J. Secur. Softw. Eng. 1(3), 56–70 (2010)
Faily, S., Fléchais, I.: User-centered information security policy development in a post-stuxnet world. In: Proceedings of the 6th International Conference on Availability, Reliability and Security, pp. 716–721 (2011)
Reason, J.: Human Error. Cambridge University Press, Cambridge (1990)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Faily, S., Stergiopoulos, G., Katos, V., Gritzalis, D. (2016). “Water, Water, Every Where”: Nuances for a Water Industry Critical Infrastructure Specification Exemplar. In: Rome, E., Theocharidou, M., Wolthusen, S. (eds) Critical Information Infrastructures Security. CRITIS 2015. Lecture Notes in Computer Science(), vol 9578. Springer, Cham. https://doi.org/10.1007/978-3-319-33331-1_20
Download citation
DOI: https://doi.org/10.1007/978-3-319-33331-1_20
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-33330-4
Online ISBN: 978-3-319-33331-1
eBook Packages: Computer ScienceComputer Science (R0)