Terrorist Protection Planning Using a Relative Risk Reduction Approach*
|
|
|
- Julie McCoy
- 10 years ago
- Views:
Transcription
1 BNL CP Terrorist Protection Planning Using a Relative Risk Reduction Approach* Session VIII: Technology Forum Focus Groups Dr. Joseph P. Indusi Nonproliferation and National Security Department Brookhaven National Laboratory P.O. Box 5000 Upton, NY Phone: Fax: indusi@ bnl.gov *This work was performed under the auspices of the US Department of Energy, Contract No. DE-AC02-98CHl0886.
2 TERRORIST PROTECTION PLANNING USING A RELATIVE RISK REDUCTION APPROACH* ABSTRACT Since the events of 9/11, there have been considerable concerns and associated efforts to prevent or respond to acts of terrorism. Very often we hear calls to reduce the threat from or correct vulnerabilities to various terrorist acts. Others fall victim to anxiety over potential scenarios with the gravest of consequences involving hundreds of thousands of casualties. The problem is complicated by the fact that planners have limited, albeit in some cases significant, resources and less than perfect intelligence on potential terrorist plans. However, valuable resources must be used prudently to reduce the overall risk to the nation. A systematic approach to this process of asset allocation is to reduce the overall risk and not just an individual element of risk such as vulnerabilities. Hence, we define risk as a function of three variables: the threat (the likelihood and scenario of the terrorist act), the vulnerability (the vulnerability of potential targets to the threat), and the consequences (health and safety, economic, etc.) resulting from a successful terrorist scenario. Both the vulnerability and consequences from a postulated adversary scenario can be reasonably well estimated. However, the threat likelihood and scenarios are much more difficult to estimate. A possible path forward is to develop scenarios for each potential target in question using experts from many disciplines. This should yield a finite but large number of targetscenario pairs. The vulnerabilities and consequences for each are estimated and then ranked relative to one another. The resulting relative risk ranking will have targets near the top of the ranking for which the threat is estimated to be more likely, the vulnerability greatest, and the consequences the most grave. In the absence of perfect intelligence, this may be the best we can do. RISK CONCEPT The concept of risk has different meanings depending on the context and individual. Here we use a logical or systematic definition based on the mathematical construction used in nuclear reactor safety and other physical systems. In this context, the risk is generally defined as (1) R=PxC, where P = probability that a system failure occurs and C is an estimate of the consequences resulting from the system failure. The analyses of the various failure events and consequences associated with nuclear power reactors have been extensively studied and delineated. *This work was performed under the auspices of the US Department of Energy, Contract No. DE-AC02-98CH
3 In an effort to introduce the concept of risk to the design of nuclear materials safeguards systems, there evolved the formulation known as the Societal Risk Approach to Safeguards.[1] In this formulation, the safeguards risk is approximated by an equation of the form: (2) R =Pax (1-Pi) x C, where Pa = probability that a person or group attempts an adversary action, Pi is the probability of adversary interruption (by the safeguards system), and C is an estimate of the consequences from the action. The implementation of this societal risk approach is problematic because of the difficulty in estimating the probability of attempt Pa. The situation for estimating the probability of interruption Pi and the consequences C is somewhat more amenable to analysis. Indeed, there has been significant progress in analyzing and quantifying both of these factors, at least in the case of nuclear facilities safeguards analysis. To cope with the difficulty in determining Pa and in an attempt to develop a useful formulation for protective system planning, we may use a less formal mathematical version of equation (2). In equation (2), we may think of Pa as the threat, that is, the element controlled by the adversary or terrorist group. The factor (1-Pi), the probability that the adversary is not interrupted, is analogous to the vulnerability (to the potential threat) of the protective system. Just as in equation (2), the consequences must also be considered. With these concepts, we now define risk as: (3) R = Threat x Vulnerability x Consequences which is estimated for each threat scenario at a given facility. A risk value for each threat scenario at a given facility may be analyzed to give a set of risk values for the given facility. Now these risk values may be ranked, relative to one another, from the highest to the lowest. Since there is no certainty or mathematical accuracy in developing the probability of attempt or threat, the risk values so derived are necessarily relative to each other. RISK CONCEPT ATTRIBUTES In the weeks and months following the attacks of 9-11, there were many calls for vulnerability, threat and risk assessments. Often, these terms were used with no standard or agreed meaning for each. In the risk formulation of equation (3), it is clear that each element has a meaning and the relationship between them is consistent and systematic. For example, using equation (3), a high risk implies a very plausible adversary scenario (threat), a target which is very vulnerable to the threat, and a severe set of consequences will occur if the threat is carried out. It should follow easily that upgrades or security plans should be based on risk and not on one or two of the elements of risk alone. Clearly, basing security upgrades on say vulnerability alone does not optimize the use of resources. Unfortunately, upgrades in facility security were often based on vulnerabilities alone. Similarly, the general public tends to focus on high consequence events, even when other elements of the risk are low. The National Strategy for Homeland Security in its July 22, 2002 report stated Accordingly, the federal government will apply a consistent methodology to focus its efforts on the highest priorities. [2] In practice, a relative value, such as low, medium or high, can be assigned to the threat, vulnerability and consequences for each threat scenario. As in the case 2
4 with equation (2), given a threat scenario at a given facility, we are capable of assigning relative vulnerability, and consequence values. In utilizing equation (3), the difficulty again lies in the threat element. Of course, with perfect intelligence, the threat can be neutralized before the adversary acts. However, in the absence of reliable threat intelligence, we must act prudently to use resources for the highest risk scenarios and targets. To proceed, it is necessary to delineate the full spectrum of potential threats against a given target or facility. For purposes of homeland security, these targets are largely the elements of the critical infrastructure such as transportation (bridges, tunnels, aircraft), energy (pipelines, power lines, etc.), finance and banking and the others. Developing these threat scenarios requires that we focus on the future, integrating and analyzing available intelligence, and thinking in the ways an adversary thinks. This is part of the message given by Col. Randall J. Larsen, (USAF-Ret.), Director of the ANSER Institute for Homeland Security in his statement for the National Commission on Terrorist Attacks Upon the United States. [3] Similarly, the National Strategy also states Mapping terrorist threats... against specific facility sectoral vulnerabilities will allow authorities to determine... which facilities and sectors are most at risk. The process of developing the threat scenarios will require participants from many disciplines and experiences, including historians, intelligence specialists, technical experts, and including military and law enforcement organizations. Once this formidable task is completed, the development of a relative risk ranking may proceed. IMPLEMENTATION Constructing a relative risk ranking begins with the list of threat scenarios against targets or facilities. Presumably this list may be small or large, but countable in number. While there is no guarantee of completeness, the mere act of developing threat scenarios is instructive in itself and provides insight into potential future threats. For each threat scenario, the vulnerability and consequences are then estimated. Fortunately, there are mathematical models to analyze both, developed in the nuclear safety and safeguards community and the military operation research community. These estimates may be qualitative such as low, medium or high. The exact values are not important for purposes of this analysis. The risk values are then determined and ranked from the highest to the lowest producing a relative risk ranking. Obviously, resources should be used to reduce the vulnerabilities or mitigate the consequences from the highest ranked threat scenarios first. In the National Strategy for Homeland Security, it is stated Protecting America s critical infrastructures thus require that we determine the highest risks..... In planning security upgrades at Brookhaven National Laboratory, a select committee was established and this relative risk ranking concept was used for ordering the upgrade schedule. CONCLUSION The relative risk assessment concept or approach for protection system planning provides a framework for systematically allocating resources. It avoids the tendency to focus only on one element of risk such as vulnerability. It also forces planners and protection managers to look to 3
5 the future and identify potential threat scenarios. Given the current global threat of terrorism, we cannot continue the methods of the past or follow the path of business as usual. REFERENCES [ 11 Societal Risk Approach to Safeguards Design and Evaluation, C. A. Bennett, W. M. Murphy, and T. S. Sherr, ERDA-7,1975. [2] National Strategy for Homeland Security, Office of Homeland Security, July [3] Col. Randall J. Larsen, (USAF-Ret.) Director, ANSER Institute for Homeland Security, Statement for National Commission on Terrorist Attacks Upon the United States, April 1,
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Department of Homeland Security Office for Domestic Preparedness. Campus Preparedness Assessment Process
Department of Homeland Security Office for Domestic Preparedness Campus Preparedness Assessment Process Campus Preparedness Assessment-Overview Purpose of the CPA Elements of the CPA How to use the CPA
How To Write A Book On Risk Management
National Center for Risk and Economic Analysis of Terrorism Events CREATE FY2015 (Year 11) Call for White Papers CREATE, the DHS-sponsored Center of Excellence at the University of Southern California,
White Paper. 7 Questions to Assess Data Security in the Enterprise
7 Questions to Assess Data Security in the Enterprise Table of Contents Executive Overview Typical Audit Questions Which Help to Maintain Security in the Enterprise 1. Who Has Which File/Folder Permissions?
National Surface Transport Security Strategy. September 2013. Transport and Infrastructure Senior Officials Committee. Transport Security Committee
National Surface Transport Security Strategy September 2013 Transport and Infrastructure Senior Officials Committee Transport Security Committee 1 National Surface Transport Security Strategy (NSTSS) Foreword
Security Vulnerability Assessment
Security Vulnerability Assessment Deter, Detect, Delay, Respond the elements for minimizing your operational risk. A detailed SVA assists you to understand how best to do so. Security Vulnerability Assessment
JULY 25, 2006. Good morning, Chairwoman Kelly, Chairman Simmons and members of the
HEARING ON TERRORISM THREATS AND THE INSURANCE MARKET STATEMENT BY TERRY FLEMING ON BEHALF OF THE RISK AND INSURANCE MANAGEMENT SOCIETY BEFORE A JOINT HEARING OF THE COMMITTEE ON FINANCIAL SERVICES, SUBCOMMITTEE
Assessment Profile: Establishing Curricular Categories for Homeland Security Education
Assessment Profile: Establishing Curricular Categories for Homeland Security Education During any examination or assessment of the subject, homeland security, it becomes quite evident that by the definition(s)
During the Clinton administration, the
8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA
DEVELOPMENT OF A RISK ASSESSMENT PROGRAM AGAINST TERRORISM IN REPUBLIC KOREA Younghee Lee, Jinkyung Kim and Il Moon Department of Chemical Engineering, Yonsei University, 134 Sinchon-dong, Seodaemun-gu,
TESTIMONY. Analyzing Terrorism Risk HENRY WILLIS CT-252. November 2005
TESTIMONY Analyzing Terrorism Risk HENRY WILLIS CT-252 November 2005 Testimony presented before the House Homeland Security Committee, Subcommittee on Intelligence, Information Sharing, and Terrorism Risk
Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies
Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business
Risk-Informed Security: Summary of Three Workshops
Risk-Informed Security: Summary of Three Workshops N. Siu Office of Nuclear Regulatory Research U.S. Nuclear Regulatory Commission Presented at INMM/ANS Workshop on Safety-Security Risk-Informed Decision-Making
AT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
WMD Terrorism Risk Assessment in the Department of Homeland Security. Why Risk Assessment? Probabilistic Risk Assessment
WMD Terrorism Risk Assessment in the Department of Homeland Security Why Risk Assessment? Joint U.S. EPA and DHS Conference On Real-World Applications and Solutions for Microbial Risk Assessment Steve
ANSER and AMERICAN MILITARY UNIVERSITY. Homeland Security Education
ANSER and AMERICAN MILITARY UNIVERSITY Homeland Security Education AGENDA Introduction Program Administration: AMU Content Administration: ANSER Homeland Security Courses Academic Degree Integration Options
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose
2374-19. Joint ICTP-IAEA School of Nuclear Energy Management. 5-23 November 2012. Nuclear Security Fundamentals Module 9 topic 2
2374-19 Joint ICTP-IAEA School of Nuclear Energy Management 5-23 November 2012 Nuclear Security Fundamentals Module 9 topic 2 EVANS Rhonda, IAEA Department of Nuclear Safety and Security Office of Nuclear
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) SUNG SOON JANG *, SUNG-WOO KWAK, HOSIK YOO, JUNG-SOO KIM
Law Enforcement and Homeland Security Anti-Terrorism Training
Law Enforcement and Homeland Security Anti-Terrorism Training Our Experience Influences Your Success Florida Department of Law Enforcement A close partnership was developed between FDLE and ASERO while
Amajor benefit of Monte-Carlo schedule analysis is to
2005 AACE International Transactions RISK.10 The Benefits of Monte- Carlo Schedule Analysis Mr. Jason Verschoor, P.Eng. Amajor benefit of Monte-Carlo schedule analysis is to expose underlying risks to
Critical Infrastructure Protection and the Evaluation Process
Critical Infrastructure Protection and the Evaluation Process Martin Hromada and Ludek Lukas Department of Security Engineering Faculty of Applied Informatics, Tomas Bata Univerzity in Zlín, Nad Stráněmi
VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point
VULNERABILITY ASSESSMENT Correctional Facilities Are Only as Secure as Their Weakest Point Today's correctional security system is a complex configuration of personnel, procedures, detection, delay and
NATIONAL NUCLEAR SECURITY ADMINISTRATION
NATIONAL NUCLEAR SECURITY ADMINISTRATION (Discretionary dollars in thousands) FY 2013 FY 2014 FY 2015 FY 2015 vs. FY 2014 Current Enacted Request $ % National Nuclear Security Administration Weapons Activities
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
Spreading the Word on Nuclear Cyber Security
Spreading the Word on Nuclear Cyber Security Clifford Glantz, Guy Landine, Philip Craig, and Robert Bass Pacific Northwest National Laboratory (PNNL) PO Box 999; 902 Battelle Blvd Richland, WA 99352 USA
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach
Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach Executing a Critical Infrastructure Risk Management Approach Risk is defined as the potential for an unwanted outcome resulting
Forensics in Nuclear Security. by the Netherlands Forensic Institute
Forensics in Nuclear Security by the Netherlands Forensic Institute Combating the threat of nuclear terrorism In an age when the threat of terrorist violence appears more immediate and more extreme than
Measurement Information Model
mcgarry02.qxd 9/7/01 1:27 PM Page 13 2 Information Model This chapter describes one of the fundamental measurement concepts of Practical Software, the Information Model. The Information Model provides
INTRUSION PREVENTION AND EXPERT SYSTEMS
INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla [email protected] Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS
CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Cyber Security Assessments of Industrial Control Systems Good Practice
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
Risk Assessment and Risk Management: Necessary Tools for Homeland Security
Risk Assessment and Risk Management: Necessary Tools for Homeland Security Paul Rosenzweig and Alane Kochems Regardless of their political beliefs, Americans want to prevent another terrorist attack from
v. 03/03/2015 Page ii
The Trident University International (Trident) catalog consists of two parts: Policy Handbook and Academic Programs, which reflect current academic policies, procedures, program and degree offerings, course
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216
I N S T I T U T E F O R D E FE N S E A N A L Y S E S NSD-5216 A Consistent Approach for Security Risk Assessments of Dams and Related Critical Infrastructure J. Darrell Morgeson Jason A. Dechant Yev Kirpichevsky
. In this case the leakage effect of tax increases is mitigated because some of the reduction in disposable income would have otherwise been saved.
Chapter 4 Review Questions. Explain how an increase in government spending and an equal increase in lump sum taxes can generate an increase in equilibrium output. Under what conditions will a balanced
Options for Cyber Security. Reactors. April 9, 2015
Options for Cyber Security Design Requirements for Power Reactors April 9, 2015 Scope Discuss options for including cyber security design requirements for power reactors into NRC regulations Scope does
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
Water Security Strategy for Systems Serving Populations Less than 100,000/15 MGD or Less
July 9, 2002 Water Security Strategy for Systems Serving Populations Less than 100,000/15 MGD or Less A. Background I.Introduction From its inception, the overall vision of the US Environmental Protection
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
Criteria for Accrediting Engineering Programs Effective for Evaluations during the 2011-2012 Accreditation Cycle
Criteria for Accrediting Engineering Programs Effective for Evaluations during the 2011-2012 Accreditation Cycle Definitions While ABET recognizes and supports the prerogative of institutions to adopt
So, What Exactly is Risk Management?
So, What Exactly is Risk Management? By Paul Wielgus, Managing Director, GDS Associates, Inc. Buyers, sellers, and others in the energy business need to understand the risks in this very uncertain environment
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY
SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
TESTIMONY OF JANICE OCHENKOWSKI ON BEHALF OF THE RISK AND INSURANCE MANAGEMENT SOCIETY, INC. (RIMS) BEFORE THE
TESTIMONY OF JANICE OCHENKOWSKI ON BEHALF OF THE RISK AND INSURANCE MANAGEMENT SOCIETY, INC. (RIMS) BEFORE THE U.S HOUSE OF REPRESENTATIVES COMMITTEE ON FINANCIAL SERVICES SUBCOMMITTEE ON INSURANCE, HOUSING
The case for continuous penetration testing
The case for continuous penetration testing By Oliver Cromwell, OccamSec Knowing your risk In an ideal world, risk management for an organization would be based on complete knowledge of all the factors
Academic Program Assessment Plan Certificate: Homeland Security Studies
Academic Program Assessment Plan Certificate: Homeland Security Studies Department of History and Political Science College of Humanities and Social Sciences Colorado State University-Pueblo Plan appended
What is my claim worth?
What is my claim worth? This is probably the most common and important question asked by a Claimant pursuing a personal injury claim. At the end of the day, it is the recovery of compensation for the injury
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Practical Calculation of Expected and Unexpected Losses in Operational Risk by Simulation Methods
Practical Calculation of Expected and Unexpected Losses in Operational Risk by Simulation Methods Enrique Navarrete 1 Abstract: This paper surveys the main difficulties involved with the quantitative measurement
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
Society s Dependence on Information Systems
Chapter 10 Society s Dependence on Information Systems . Contents Page Introduction **..*. ***. **, * * * e *.. *,..... *. *. * *., *,............... 97 Failure **** *.** * *.. * * *... * *.... *.. * *
WorkStream Management Driving Early Project Delivery with Phoenix Project Manager
Phoenix WorkStream Scheduling WorkStream Management Driving Early Project Delivery with Phoenix Project Manager Executive Summary As a team member on any project, you are focused on project delivery: meeting
Change Management. Why Change Management? CHAPTER
Change Management 19 CHAPTER In this chapter, you will Learn why change management is an important enterprise management tool Understand the key concept of segregation of duties Review the essential elements
Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment
Development of An Analysis Tool For Performing Civil Aviation Security Risk Assessment Allan R. Hunt AKELA, Inc. 5276 Hollister Avenue, Suite 263 Santa Barbara, CA 93111 Karl F. Kellerman FAA Office of
Service Desk/Helpdesk Metrics and Reporting : Getting Started. Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.
Service Desk/Helpdesk Metrics and Reporting : Getting Started Author : George Ritchie, Serio Ltd email: george dot- ritchie at- seriosoft.com Page 1 Copyright, trademarks and disclaimers Serio Limited
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District
U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District Securing the Nation s s critical infrastructures one community at a time Critical Infrastructure & Key Resources
IAEA Support for the Establishment of Nuclear Security Education
IAEA Support for the Establishment of Nuclear Security Education Andrea Braunegger-Guelich, Vladimir Rukhlo Office of Nuclear Security Department of Nuclear Safety and Security International Atomic Energy
THE ROLE OF PROJECT MANAGEMENT IN KNOWLEDGE MANAGEMENT
1-04-15 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGY THE ROLE OF PROJECT MANAGEMENT IN KNOWLEDGE MANAGEMENT Ralph L. Kliem INSIDE Basics of Knowledge Management and Project Management; Work
A Contact Center Crystal Ball:
A Contact Center Crystal Ball: Marrying the Analyses of Service, Cost, Revenue, and Now, Customer Experience Ric Kosiba, Ph.D. Vice President Interactive Intelligence, Inc. Table of Contents Introduction...
Best Practices in Digital Rights Management:
Neustar Insights Whitepaper Best Practices in Digital Rights Management: Reducing the Risk to Online Content with IP Intelligence CONTENTS Executive Summary 2 Content Reigns on the Internet 3 The Need
An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission
An ESRI White Paper May 2007 GIS Supporting the Homeland Security Mission ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
National and Transnational Security Implications of Big Data in the Life Sciences
Prepared by the American Association for the Advancement of Science in conjunction with the Federal Bureau of Investigation and the United Nations Interregional Crime and Justice Research Institute National
The Homeland Security and Preparedness College of The NJ-OHSP
The Homeland Security and Preparedness College of The NJ-OHSP Presented By Paul J. Lioy, Ph.D. Executive Committee of the College and Deputy Director of the Environmental and Occupational Health Sciences
Nuclear Security Plan 2014 2017
Atoms for Peace Board of Governors General Conference GOV/2013/42-GC(57)/19 Date: 2 August 2013 For official use only Item 4(b) of the Board s provisional agenda (GOV/2013/37) Item 16 of the Conference's
OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak
March 22, 2004 OVERVIEW OF THE ADMINISTRATION S FY 2005 REQUEST FOR HOMELAND SECURITY By Steven M. Kosiak The Bush Administration s fiscal year (FY) 2005 budget request includes $47.4 billion for homeland
White Paper The Return on Investment of Automated Patch Management
White Paper The Return on Investment of Automated Patch Management July 2006 Introduction It s a simple truth: applying patches is the only definitive way to keep vulnerable systems from being exploited.
The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix
The Role of Dispute Settlement Procedures in International Trade Agreements: Online Appendix Giovanni Maggi Yale University, NBER and CEPR Robert W. Staiger Stanford University and NBER November 2010 1.
The National Counterintelligence Strategy of the United States
The National Counterintelligence Strategy of the United States Office of the National Counterintelligence Executive March 2005 National Counterintelligence Strategy of the United States PREFACE The Counterintelligence
Science/Safeguards and Security. Funding Profile by Subprogram
Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber
Purpose of the Governor s strategy. Guiding Principles
Purpose of the Governor s strategy The Governor s initiative to develop and implement a State of Tennessee program to counter terrorism within the State is outlined in this document. The primary purpose
HIPAA Security Rule Toolkit
California Office of Health Information Integrity (CalOHII) HIPAA Security Rule Toolkit User Guide Version 1.0 2/1/2012 Table of Contents 1.0 - HIPAA Security Rule Background... 0 2.0 Purpose... 1 3.0
Building Metrics for a Process
Building Metrics for a Our last column kicked off a series on process metrics. We started off by citing some of the problems and pitfalls we have encountered in our work with clients, such as creating
