Review of Tonelli Federico's PhD thesis -- Lilian Wu This thesis fully satisfies the requirement of Ph.D. work and Mr. Federico should be granted the Ph.D. degree. My review of Tonelli Federico's PhD thesis is from the perspective of a person that funds and manages a portfolio of research collaborations with universities where the area of cybersecurity is growing in importance. This thesis addresses a very important topic where an ICT infrastructure is under attack by intelligent, persistent agents. These agents aim to control some predefined infrastructure component to steal information or to damage the infrastructure. This work will be important for organizations to not only assess the risk of their ICT network and infrastructure but only help to design better and less vulnerable complex systems. In his Ph.D. thesis, Federico Tonelli proposes to assess and manage the risk due to a complex ICT infrastructure by adopting a Monte Carlo method. This method returns a sample to compute the statistics of interest. The thesis also discusses the specification, design, and validation of an integrated suite of programming tools to automate the use of the Monte Carlo method. The thesis is well written and this work has been presented in a large number of papers in international peer-reviewed journals and conferences. Most impressive are the results described in Section 6 of the thesis -- the validation of the methodology and suite of tools. Impressive is the fact it has been validated when used in several real world defense exercises where an ICT system was under attack by a team of ethical hackers selected by the NATO. The defender team in the exercise applied the methodology and the suite of tools to select the countermeasures to deploy to increase the system robustness before the hacker team started its attack. And increasing the robustness of the target system. The output of these exercises confirms the accuracy of both the methodology and the tools to assess and manage ICT risk. For real world use, Section 7 outlines the assessments to evaluate the proposed approach to ICT risk assessment and management. These assessments support the claim that the suite and the methodology can predict the behavior of a system under attacks by APTs and manage the resulting risk in a cost effective way. The following are the main thesis contributions for cybersecurity managers and practitioners: 1. the definition of a quantitative, verifiable, model-based approach to ICT risk assessment and management. The approach is scenario based and each scenario includes the target system and some intelligent attackers. The proposed approach overcomes some well-known problems such as the huge complexity of building a complete attack graph for each attacker, 2. being model based, the proposed methodology supports ICT risk assessment and management at any time of the life of a system from its design, 3. the definition of an integrated set of programming tools to automate the adoption of the methodology. This supports the application of the methodology even to complex ICT infrastructures. 4. the experimental validation of the methodology and of the tools through a large number of assessment of real complex infrastructures. Lilian Wu January 16, 2017
© Copyright 2026 Paperzz