SlideShare a Scribd company logo
1 of 13
Download to read offline
A better understanding

Safety versus Security
The author

Stéphane POTIER
Technology Marketing Manager
B&R Automation
stephane.potier@br-automation.com

Perfection in Automation
www.br-automation.com
Safety
Definition
Safety is freedom from unacceptable risk of physical injury or of
damage to the health of people, either directly, or indirectly as a
result of damage to property or to the environment.
Safety is an attribute of Dependability.
Dependability
Definition
Dependability of a system is the ability to deliver service that can
justifiably be trusted.
Dependability is a measure of a system's availability, reliability,
safety, integrity and its maintainabilty
Security
Definition
Security is the prevention of illegal or unwanted penetration,
intentional or unintentional interference with the proper and intended
operation, or inappropriate access to confidential information in
industrial automation and control systems.

Security is a composite of availability, confidentiality and integrity.
Dependability & Security attributes
Definition
• Availability - readiness for correct service (usually expressed as a
percentage of uptime in a given year)
• Reliability - continuity of correct service (typically expressed as a
probability of failure-free system operation over a specified time)
• Safety - absence of catastrophic consequences or severe injuries
on the users and the environment
• Confidentiality: absence of unauthorized disclosure of information
• Integrity - absence of improper system alteration
• Maintainability - ability for a process to undergo modifications and
repairs
Dependability attributes
Relationship

Availability
Reliability
Safety
Dependability
Confidentiality

Integrity
Maintainability
Security attributes
Relationship

Availability
Reliability
Safety
Security
Confidentiality

Integrity
Maintainability
Functional Safety
Definition
Functional safety is part of the overall safety that depends on a
system or equipment operating correctly in response to its inputs.
including the safe management of likely operator errors, hardware
failures and environmental changes.

IEC 61508 is intended to be a basic functional safety standard
applicable to all kinds of industry.
Translation
French
•
•
•
•
•
•
•

Dependability = Sûreté de fonctionnement
Reliability = Fiabilité
Availability = Disponibilité
Maintainability = Maintenabilité
Safety = Sécurité/Sûreté (1)
Security = Sécurité (1)
Integrity = Intégrité

(1) The

French word « Sécurité » is used to translate
both « Safety » and « Security ». In some industries, the
word « Sûreté » is used to translate « Safety ».
Translation
German
•
•
•
•
•
•
•

Dependability = Verlässlichkeit
Reliability = Zuverlässigkeit
Availability = Verfügbarkeit
Maintainability = Instandhaltbarkeit
Safety = Sicherheit (2)
Security= Sicherheit (2)
Integrity = Integrität

(2) The

German word « Sicherheit » is used to translate
both « Safety » and « Security ». For this reason the
English terms are usually preferred.
References
[1] http://en.wikipedia.org/wiki/Dependability
[2] http://www.iec.ch/functionalsafety
[3] IEC/TS 62443-1-1 Industrial communication networks – Network
and system security – Part 1-1: Terminology, concepts and models
[4] A. Avizienis, J.-C. Laprie and B. Randell: Fundamental Concepts
of Dependability. Research Report No 1145, LAAS-CNRS, April
2001
[5] http://www.open-safety.org
YOUR GLOBAL PARTNER FOR
AUTOMATION EXCELLENCE

More Related Content

What's hot

Industrial Hygiene
Industrial HygieneIndustrial Hygiene
Industrial Hygiene
vasant oak
 

What's hot (20)

Contractor safety management system
Contractor safety  management systemContractor safety  management system
Contractor safety management system
 
Facility management safety
Facility management  safetyFacility management  safety
Facility management safety
 
1 osh2-emergency
1 osh2-emergency1 osh2-emergency
1 osh2-emergency
 
Occupational hazards and pulmonary disease
Occupational hazards and pulmonary diseaseOccupational hazards and pulmonary disease
Occupational hazards and pulmonary disease
 
Ppe Training
Ppe TrainingPpe Training
Ppe Training
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
Rescue Powerpoint
Rescue PowerpointRescue Powerpoint
Rescue Powerpoint
 
Bomb threat presnt
Bomb threat presntBomb threat presnt
Bomb threat presnt
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 
Occupational safety and health Lecture 1 safety
Occupational safety and health Lecture 1 safetyOccupational safety and health Lecture 1 safety
Occupational safety and health Lecture 1 safety
 
Hazard Communication
Hazard Communication Hazard Communication
Hazard Communication
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Industrial Hygiene
Industrial HygieneIndustrial Hygiene
Industrial Hygiene
 
Intro-Module1-2_BOSHforSO1_v200806 - Copy.pptx
Intro-Module1-2_BOSHforSO1_v200806 - Copy.pptxIntro-Module1-2_BOSHforSO1_v200806 - Copy.pptx
Intro-Module1-2_BOSHforSO1_v200806 - Copy.pptx
 
Class on ICS
Class on ICSClass on ICS
Class on ICS
 
Emergency Response Teams
Emergency Response TeamsEmergency Response Teams
Emergency Response Teams
 
Ppt Site Security Management
Ppt  Site Security ManagementPpt  Site Security Management
Ppt Site Security Management
 
Safety (Security) Training
Safety (Security) TrainingSafety (Security) Training
Safety (Security) Training
 
Hazards and Hazardous Substances
Hazards and Hazardous SubstancesHazards and Hazardous Substances
Hazards and Hazardous Substances
 
Physical security
Physical securityPhysical security
Physical security
 

Similar to Safety versus security

Tuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-enTuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-en
Ziv Nuss
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
CODE BLUE
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
Ola Odejayi
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Thorne & Derrick UK
 

Similar to Safety versus security (20)

Continuous Security
Continuous SecurityContinuous Security
Continuous Security
 
Tuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-enTuv rheinland-ot-security-risk-management-flyer-en
Tuv rheinland-ot-security-risk-management-flyer-en
 
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
[CB16] Using the CGC’s fully automated vulnerability detection tools in secur...
 
Information Assurance & Reliability Architecture
Information Assurance & Reliability ArchitectureInformation Assurance & Reliability Architecture
Information Assurance & Reliability Architecture
 
A holistic view_of_enterprise_security
A holistic view_of_enterprise_securityA holistic view_of_enterprise_security
A holistic view_of_enterprise_security
 
Word of the week - Safety Integrity Level
Word of the week - Safety Integrity LevelWord of the week - Safety Integrity Level
Word of the week - Safety Integrity Level
 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
 
Reliability Engineering and Terotechnology
Reliability Engineering and TerotechnologyReliability Engineering and Terotechnology
Reliability Engineering and Terotechnology
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
Introduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL CertificationIntroduction to Functional Safety and SIL Certification
Introduction to Functional Safety and SIL Certification
 
Gtg product brochure 2015
Gtg product brochure 2015Gtg product brochure 2015
Gtg product brochure 2015
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
SIL.ppt
SIL.pptSIL.ppt
SIL.ppt
 
9536322.ppt
9536322.ppt9536322.ppt
9536322.ppt
 
Secure Engineering Practices for Java
Secure Engineering Practices for JavaSecure Engineering Practices for Java
Secure Engineering Practices for Java
 
System Safety Engineering 2011
System Safety Engineering 2011System Safety Engineering 2011
System Safety Engineering 2011
 
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
Drager Fixed Gas Detector - Functional Safety & Gas Detection Systems - SIL B...
 
The Charter of Trust
The Charter of TrustThe Charter of Trust
The Charter of Trust
 
Management Information System Presentation
Management Information System PresentationManagement Information System Presentation
Management Information System Presentation
 

More from Stephane Potier

More from Stephane Potier (7)

Create your own OPC UA information model
Create your own OPC UA information modelCreate your own OPC UA information model
Create your own OPC UA information model
 
OPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion SpecificationsOPC UA - Information Models & Companion Specifications
OPC UA - Information Models & Companion Specifications
 
An introduction to X.509 certificates
An introduction to X.509 certificatesAn introduction to X.509 certificates
An introduction to X.509 certificates
 
Emballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelleEmballage 4.0 : vers l'excellence opérationnelle
Emballage 4.0 : vers l'excellence opérationnelle
 
Industry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging linesIndustry 4.0 - Enabling operational excellence of packaging lines
Industry 4.0 - Enabling operational excellence of packaging lines
 
Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0Open standards - Key to success for Industry 4.0
Open standards - Key to success for Industry 4.0
 
Industrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologiesIndustrial Ethernet Facts - The 5 major technologies
Industrial Ethernet Facts - The 5 major technologies
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 

Safety versus security