Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Evolving Security



Edward Griffor


The topic of system security, and in particular that of cybersecurity differs in a critical way from the other concerns we have about systems. Though concerns like safety and resil- ience do have challenges associated with design, realization, and validation to an ever changing operating environment, security faces an ever evolving adversary. When faced with constantly changing conditions under which a system must continue to deliver its function, designers attempt to model those conditions and test their design against that model. Modeling also becomes important from a measurement standpoint. In order to assess systems and determine their overall risk, their overall security posture, design coun- termeasures, and then reassess systems to determine the effectiveness of countermeasures in a provable, reproducible, repeatable quantitative manner, we must be able to model the security, vulnerability, and risk of these systems. In this chapter we will introduce new modes of modeling for security adversaries and discuss some basic foundations for adversary modeling. We also discuss how connectivity to other systems, their interactions increase complexity. These complexities also need to be identified and modeled to understand the derivative effect on the overall security posture.
Handbook of System Safety and Security
Publisher Info
Elsevier, Atlanta, GA


Adversary, game theory, cyber-physical systems, cybersecurity


Griffor, E. (2016), Evolving Security, Handbook of System Safety and Security, Elsevier, Atlanta, GA, [online], (Accessed June 19, 2024)


If you have any questions about this publication or are having problems accessing it, please contact

Created October 2, 2016, Updated March 31, 2023