IEEE Technology and Society Magazine - March 2017 - 53

technological configuration to end-user vulnerability,
specifically the additional risk of Internet-enabled medical implant devices.

Classical Risk Analysis
Classical risk analysis begins with a description of the
system of interest [6]. Generally, such systems are only
defined implicitly, lacking a definition of specific configuration of the system, i.e., a precise definition of the
streams, components, and subsystems, and interconnection architecture. The analysis develops an expertgenerated list of possible hazards (either specific or
hazard-types) and of associated possible harms. The
analysis is completed by using a lookup table to assign
a risk category according to each combination of identified hazard and consequent harm. Although valuable,
the practice of carrying out a risk analysis suffers from
several drawbacks:
■ Reliance on system definition precision, without
which resulting assessments of hazards are
imprecise.
■ Given the plethora of possible hazards, the process is
inherently likely to fail to identify all relevant hazards.
■ Some hazards may be statistically predictable from
historical data, but for others, experts may either
inaccurately assess probability, or fail to identify a
case where a hazard is intentional.
■ A "probability of occurrence" assessment does not
take into account the specific state of the system at
some instant in time - if the system is close to
design capacity at the instant when a hazard occurs,
the probability of the hazard causing harm, may be
higher than if the hazard occurred at an instant
when the system load was low.
■ The use of categories to correlate harm and hazard
is normally coarse-grained, not accounting for
changes to system configuration.
Application of classical risk analysis to design decisions for implanted devices (as a general case) is difficult due to the unknown nature of environmental
threats, the long design life with consequent possibility of emergent hazards and the inability of coarsegrained risk analysis to inform detailed design
decisions. Moreover, the analysis may omit consideration of the added threat of malicious intent enabled
by connectivity functionality.

Foundational Concepts
of the Proposed "Exposure" Metric

qualitatively different from the effect of a random hazard. The intentional hazard will occur every time one
elects to cause the hazard and hence has a probability
of occurrence of 1.0. An autonomous malicious entity
will also actively seek weaknesses and attempt to
thwart mitigatory or contingency measures, regardless
of whether these have been identified by a risk assessment exercise. Thus, for intentionally guided hazards
(or for the long timeframes envisaged in this case) the
risk "probability" concept has limited usefulness. The
significance of this distinction may not be fully appreciated in practice.

Linkage of Hazard to Weakness
Events external to a technology system only threaten
the output of the technology system when the external events align with a technology system weakness.
Irrespective of probability of occurrence, if the hazard

Successful operation of medical
devices can be life saving,
but the consequences of failure
are severe.

does not align with a system weakness then the event
occurrence is unimportant, as it will not compromise
system performance [7]. Conversely, if an unidentified
weakness exists within a technological system, unrecognized hazards may exist that align with the
weakness, creating unrecognized contributions to
overall vulnerability.

The Importance of System
Technological Configuration
If the configuration of a particular technology system is
changed, weaknesses may be removed or added. For
each weakness added, additional external events
should be re-categorized as hazards - and for weaknesses removed, the associated external events cease
to be hazards.

An "Exposure" Metric Developed and Described

Intended Hazards

Refining the Need for an Exposure Metric

Terrorism or sabotage in particular must be considered as intentional type of hazard. The effect of an
intentional type of hazard upon a risk assessment is

Assessing the contribution of a technological system's
configuration to the vulnerability of its end user calls
for an approach that derives a quantitative measure

march 2017

∕

IEEE Technology and Society Magazine

53



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - March 2017

IEEE Technology and Society Magazine - March 2017 - Cover1
IEEE Technology and Society Magazine - March 2017 - Cover2
IEEE Technology and Society Magazine - March 2017 - 1
IEEE Technology and Society Magazine - March 2017 - 2
IEEE Technology and Society Magazine - March 2017 - 3
IEEE Technology and Society Magazine - March 2017 - 4
IEEE Technology and Society Magazine - March 2017 - 5
IEEE Technology and Society Magazine - March 2017 - 6
IEEE Technology and Society Magazine - March 2017 - 7
IEEE Technology and Society Magazine - March 2017 - 8
IEEE Technology and Society Magazine - March 2017 - 9
IEEE Technology and Society Magazine - March 2017 - 10
IEEE Technology and Society Magazine - March 2017 - 11
IEEE Technology and Society Magazine - March 2017 - 12
IEEE Technology and Society Magazine - March 2017 - 13
IEEE Technology and Society Magazine - March 2017 - 14
IEEE Technology and Society Magazine - March 2017 - 15
IEEE Technology and Society Magazine - March 2017 - 16
IEEE Technology and Society Magazine - March 2017 - 17
IEEE Technology and Society Magazine - March 2017 - 18
IEEE Technology and Society Magazine - March 2017 - 19
IEEE Technology and Society Magazine - March 2017 - 20
IEEE Technology and Society Magazine - March 2017 - 21
IEEE Technology and Society Magazine - March 2017 - 22
IEEE Technology and Society Magazine - March 2017 - 23
IEEE Technology and Society Magazine - March 2017 - 24
IEEE Technology and Society Magazine - March 2017 - 25
IEEE Technology and Society Magazine - March 2017 - 26
IEEE Technology and Society Magazine - March 2017 - 27
IEEE Technology and Society Magazine - March 2017 - 28
IEEE Technology and Society Magazine - March 2017 - 29
IEEE Technology and Society Magazine - March 2017 - 30
IEEE Technology and Society Magazine - March 2017 - 31
IEEE Technology and Society Magazine - March 2017 - 32
IEEE Technology and Society Magazine - March 2017 - 33
IEEE Technology and Society Magazine - March 2017 - 34
IEEE Technology and Society Magazine - March 2017 - 35
IEEE Technology and Society Magazine - March 2017 - 36
IEEE Technology and Society Magazine - March 2017 - 37
IEEE Technology and Society Magazine - March 2017 - 38
IEEE Technology and Society Magazine - March 2017 - 39
IEEE Technology and Society Magazine - March 2017 - 40
IEEE Technology and Society Magazine - March 2017 - 41
IEEE Technology and Society Magazine - March 2017 - 42
IEEE Technology and Society Magazine - March 2017 - 43
IEEE Technology and Society Magazine - March 2017 - 44
IEEE Technology and Society Magazine - March 2017 - 45
IEEE Technology and Society Magazine - March 2017 - 46
IEEE Technology and Society Magazine - March 2017 - 47
IEEE Technology and Society Magazine - March 2017 - 48
IEEE Technology and Society Magazine - March 2017 - 49
IEEE Technology and Society Magazine - March 2017 - 50
IEEE Technology and Society Magazine - March 2017 - 51
IEEE Technology and Society Magazine - March 2017 - 52
IEEE Technology and Society Magazine - March 2017 - 53
IEEE Technology and Society Magazine - March 2017 - 54
IEEE Technology and Society Magazine - March 2017 - 55
IEEE Technology and Society Magazine - March 2017 - 56
IEEE Technology and Society Magazine - March 2017 - 57
IEEE Technology and Society Magazine - March 2017 - 58
IEEE Technology and Society Magazine - March 2017 - 59
IEEE Technology and Society Magazine - March 2017 - 60
IEEE Technology and Society Magazine - March 2017 - 61
IEEE Technology and Society Magazine - March 2017 - 62
IEEE Technology and Society Magazine - March 2017 - 63
IEEE Technology and Society Magazine - March 2017 - 64
IEEE Technology and Society Magazine - March 2017 - 65
IEEE Technology and Society Magazine - March 2017 - 66
IEEE Technology and Society Magazine - March 2017 - 67
IEEE Technology and Society Magazine - March 2017 - 68
IEEE Technology and Society Magazine - March 2017 - 69
IEEE Technology and Society Magazine - March 2017 - 70
IEEE Technology and Society Magazine - March 2017 - 71
IEEE Technology and Society Magazine - March 2017 - 72
IEEE Technology and Society Magazine - March 2017 - 73
IEEE Technology and Society Magazine - March 2017 - 74
IEEE Technology and Society Magazine - March 2017 - 75
IEEE Technology and Society Magazine - March 2017 - 76
IEEE Technology and Society Magazine - March 2017 - 77
IEEE Technology and Society Magazine - March 2017 - 78
IEEE Technology and Society Magazine - March 2017 - 79
IEEE Technology and Society Magazine - March 2017 - 80
IEEE Technology and Society Magazine - March 2017 - 81
IEEE Technology and Society Magazine - March 2017 - 82
IEEE Technology and Society Magazine - March 2017 - 83
IEEE Technology and Society Magazine - March 2017 - 84
IEEE Technology and Society Magazine - March 2017 - 85
IEEE Technology and Society Magazine - March 2017 - 86
IEEE Technology and Society Magazine - March 2017 - 87
IEEE Technology and Society Magazine - March 2017 - 88
IEEE Technology and Society Magazine - March 2017 - Cover3
IEEE Technology and Society Magazine - March 2017 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com