Functional security and virtual security are two important aspects of system security. They should be considered as equally important goals in system development. Functional safety focuses on preventing malfunctions that could lead to injuries or material damage. Virtual security focuses on defending against attacks that could lead to the system being compromised or sensitive data being disclosed.
Definition of functional safety
Functional safety focuses on preventing malfunctions that could lead to injuries or material damage. Electrical or electronic safety devices must be integrated into machines in such a way that they reliably fulfill their protective function in the event of danger. If this is guaranteed, the machine or system is functionally safe.
Risk assessment is an important part of functional safety. In the planning and development phase of a system, it is important to avoid potential hazards from the outset and to eliminate or reduce risks in the area of functional safety, e.g. through the use of protective measures. To reduce the residual risk, it may be necessary for the operator of a machine or system to use PPE (personal protective equipment). Training and regular instruction also contribute to the reduction.
Functional security vulnerabilities can be caused by a number of factors, such as
- Faulty design
- Faulty implementation
- Faulty maintenance
- Environmental influences
External hazards such as vandalism or fire, for example, do not fall within the scope of functional safety.
Functional security gaps can be avoided by, for example
- Security design
- Safety check
- Security tests
- Safety training
Here are some examples offunctional safety measures:
Safety design:
The system should be designed in such a way that it is resistant to malfunctions.
Safety check: The system should be checked for safety gaps before commissioning.
Security tests: The system should be regularly tested for security vulnerabilities after commissioning.
Definition of virtual security
Virtual security is the ability of a system to safely fulfill its intended functions under all expected operating conditions, even if it is attacked. Virtual security focuses on defending against attacks that could lead to the system being compromised or sensitive data being disclosed.
An example of a virtual security attack is a DDoS attack, in which a system is overloaded with so much data traffic that it no longer functions. Another example is a hacking attack in which an attacker gains access to a system and taps into sensitive data.
Virtual security vulnerabilities can be caused by a number of factors, e.g:
- Weak passwords
- Unprotected networks
- Vulnerable software
- Inadequate safety precautions
Virtual security gaps can be avoided by e.g:
- Secure password management
- Network security
- Software updates
- Safety precautions
Here are some examples of virtual security measures:
Firewalls:
Firewalls protect systems from unwanted data traffic.
Intrusion Detection Systems (IDS):
IDS detect attacks on systems and sound the alarm.
Intrusion Prevention Systems (IPS):
IPS block attacks on systems.
Penetration tests:
Penetration tests simulate attacks on systems in order to identify security vulnerabilities.
Conclusion
Functional security and virtual security are two important aspects of system security. They should be considered as equally important goals in system development. A combination of functional security measures and virtual security measures can protect systems from malfunctions and attacks.