IIC Journal of Innovation 20th Edition Trustworthy July 2022, 20th Edition | Page 12

4 TIME . HAZARDS , PERILS

Figure 3-3 : IT / OT landscape and trustworthiness .
The former article [ 1 ] introduced the Trustworthy System Status Model ( TSSM ), Figure 4-1 shows this model with the original diagram . All incidents which likely challenge the normal status of the system are driven by threats . The term threat is widely used in security models , borrowed from the military context with attacks and defense .
However , in the world of safety , reliability and commercial resilience models , the usage of threat is rare . Instead , the term hazard is more common . With the merging of security and safety in trustworthiness , both terms will be used side by side . In the normal usage of the English language , both terms are synonyms , typically describing the potential start of an accident or an attack , leading to equipment damage , injury , or death of humans . Definitions in dictionaries like Collins [ 2 ] or Merriam-Webster [ 3 ] are less about the reason of a threat or hazard but more about the results : source of danger , causing damage , etc . – and used synonymously for hazard and threat .
In this article both terms will be defined in a unique way to be strictly used to describe any incident in a system caused either by a threat or by a hazard . In the same way , terms like attack or accident are properly defined and assigned .
Journal of Innovation 7