Dynamic Vulnerability Assessment
|
|
|
- Brianne Rose
- 9 years ago
- Views:
Transcription
1 SANDIA REPORT SAND Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico and Livermore, California Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under Contract DE-AC04-94AL Approved for public release; further dissemination unlimited.
2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, make any warranty, express or implied, or assume any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represent that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government, any agency thereof, or any of their contractors or subcontractors. The views and opinions expressed herein do not necessarily state or reflect those of the United States Government, any agency thereof, or any of their contractors. Printed in the United States of America. This report has been reproduced directly from the best available copy. Available to DOE and DOE contractors from U.S. Department of Energy Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN Telephone: (865) Facsimile: (865) Online ordering: Available to the public from U.S. Department of Commerce National Technical Information Service 5285 Port Royal Rd Springfield, VA Telephone: (800) Facsimile: (703) Online order: 2
3 SAND Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Security Technology Sandia National Laboratories P.O. Box 5800 Albuquerque, NM Abstract With increased terrorist threats in the past few years, it is no longer feasible to feel confident that a facility is well protected with a static security system. Potential adversaries often research their targets, examining procedural and system changes, in order to attack at a vulnerable time. Such system changes may include scheduled sensor maintenance, scheduled or unscheduled changes in the guard force, facility alert level changes, sensor failures or degradation, etc. All of these changes impact the system effectiveness and can make a facility more vulnerable. Currently, a standard analysis of system effectiveness is performed approximately every six months using a vulnerability assessment tool called ASSESS (Analytical Systems and Software for Evaluating Safeguards and Systems). New standards for determining a facility s system effectiveness will be defined by tools that are currently under development, such as ATLAS (Adversary Time-line Analysis System) and NextGen (Next Generation Security Simulation). Although these tools are useful to model analyses at different spatial resolutions and can support some sensor dynamics using statistical models, they are limited in that they require a static system state as input. They cannot account for the dynamics of the system through day-to-day operations. The emphasis of this project was to determine the feasibility of dynamically monitoring the facility security system and performing an analysis as changes occur. Hence, the system effectiveness is known at all times, greatly assisting time-critical decisions in response to a threat or a potential threat. 3
4 1 Introduction Dynamic Vulnerability Assessment With increased terrorist threats in the past few years, it is no longer feasible to feel confident that a facility is well protected with a static security system. Potential adversaries often research their targets, examining procedural and system changes, in order to attack at a vulnerable time. Such system changes may include scheduled sensor maintenance, scheduled or unscheduled changes in the guard force, facility alert level changes, sensor failures or degradation, etc. All of these changes impact the system effectiveness and can make a facility more vulnerable. Currently, a standard analysis of system effectiveness is performed approximately every six months using a vulnerability assessment tool called ASSESS (Analytical Systems and Software for Evaluating Safeguards and Systems). New standards for determining a facility s system effectiveness will be defined by tools that are currently under development, such as ATLAS (Adversary Time-line Analysis System) and NextGen (Next Generation Security Simulation). Although these tools are useful to model analyses at different spatial resolutions and can support some sensor dynamics using statistical models, they are limited in that they require a static system state as input. They cannot account for the dynamics of the system through day-to-day operations. Analysis tools that can understand the dynamic changes that occur in a facility within the constructs of the current vulnerability analysis tool set are needed. The emphasis of this project was to determine the feasibility of dynamically monitoring the facility security system and performing an analysis as changes occur. In this sense, the system effectiveness is known at all times. This will greatly enhance the response decisions that are critical during an attack or to prevent an attack. This work highly leveraged the capabilities in ASSESS to define elements, their safeguards, and their associated performance values. It also leveraged capabilities in ATLAS to obtain critical system performance values. A software simulation was developed as a proof-of-concept to demonstrate the capability of providing a continual analysis of system effectiveness on a dynamically changing security system. A description of facility information used from ASSESS and ATLAS is provided in Section 2. Section 3 describes the overall software architecture of the Dynamic Vulnerability Analysis (DVA) simulation. A description of the operation of the simulation is presented in Section 4. The project is summarized in Section 5. 2 Background A key component of performing a vulnerability analysis on a facility is a description of its physical security system. The facility information is defined using an Adversary Sequence Diagram (ASD), which is a schematic representation of a facility and its safeguards components (See Figure 1). Each area of the facility that separates the offsite area with the target area is represented by a horizontal bar. Path elements are the portals that connect the areas. A path element exists for each possible access method into and out of the area. Types of path elements include door (DOR), personnel portal (PER), vehicle portal (VEH), gate (GAT), fence (FEN), surface (SUR), duct (DUC), shipping door (SHP), emergency exit (EMX), etc. 4
5 Figure 1. Adversary Sequence Diagram with areas and path elements defined. Each path element has certain characteristics (Alarm Assessment, SNM Sweep, Traffic Flow, Background Radiation, and Material Container) that are addressed by a set of safeguards. The safeguards define the security at the associated path element. There are seven categories of safeguards: Access Control, Contraband Detection, SNM Detection, Material Transfer Control, Intrusion Detection, Access Delay, and Security Inspectors. Each element may have a different set of possible safeguards for each category. The data that describes the security system of the facility is saved in a file. This is the baseline description of the safeguards that are used for dynamic vulnerability assessment. Performance characteristics are defined for each safeguard. These may change depending on the threat that is being addressed. The performance values are used to statistically determine critical paths to the target and the probability of interruption of the intruder (PI) under different threat conditions. 3 DVA Software Architecture A proof-of-concept software simulation was developed to perform vulnerability analysis dynamically on a facility security system. The main goals of the project were to (1) automatically detect changes in safeguards, which may affect the system effectiveness, (2) analyze a changing system over a period of time so that at any time during that period, the system effectiveness is known, and (3) provide a visualization tool for an operator showing critical paths to the target that are updated as the system effectiveness changes. A high level design of the simulation system is shown in Figure 2. DVA Monitor is a process that receives status information about the system. This includes the status of safeguards, the current guard force schedule, scheduled maintenance, on or off hour operation, etc. DVA Response is a process that reads the DVA results and displays the information to an operator. 5
6 Sensor 1 Sensor 2 Sensor N DVA Monitor Communications Link (VA Results) DVA Response Critical Paths PI Other VA results Schedules Time Figure 2. High level DVA System Architecture The DVA Monitor process runs on a separate machine that is capable of receiving inputs from all sensors as well as mouse or keyboard input regarding schedule information. Schedule information may include times of day and night operations, guard schedule, guard absences, maintenance schedules, item movement schedules, and any other type of information that may affect the performance characteristics of the physical security system components. The sensors provide operational status information (i.e., on/off or working/not working). A degradation factor would also be applied to sensors. This may be based on the expected life of a sensor or by monitoring the strength of a sensor signal. If a sensor fails, its degradation factor is 100 percent. A clock input is provided in order to make automatic configuration changes of the physical security system at scheduled times and to perform a vulnerability analysis on the system at scheduled times. VA algorithms are called from this process. These algorithms are the same as those used with standard VA tools such as ASSESS or ATLAS. The databases used in these tools are also accessible on a dynamic basis. Whenever changes to the security system occur, the VA results are updated. They are saved in a file and are then sent to the DVA Response process for display. The DVA Response process provides an interface between an alarm station operator and the dynamically changing vulnerability analysis results. The DVA information provided to the operator would help in quickly identifying weaknesses in the physical security system and would provide a key role in making decisions regarding guard placement or counter-attack strategies. Vulnerability analysis algorithms provide a substantial suite of information regarding the critical paths to a target and the probability of interruption (PI) of the adversary assuming various response force times. The critical paths and their associated PIs are displayed for the user. Other VA results are available for presentation to the operator if needed. 4 DVA Proof-of-Concept Operation The Monitor process is initialized with a facility Physical Security System (.pps) file (Figure 3). This file contains all the information regarding the possible path elements and their associated safeguards for the selected facility. This file is created when an analysis is first done on a facility (See Section 2). The initial.pps file provides a baseline for future analysis and is used to establish the initial status of the DVA system when it is first initialized. The failure or degradation of safeguards is accounted for in the DVA Monitor process, but the baseline.pps file is not changed. 6
7 Figure 3. Selection of a Physical Protection System file for a facility. Once the system is initialized with the appropriate.pps file, monitoring of the facility security status begins. A new vulnerability analysis can be run at any time on the facility by selecting the Run Analysis button on the user interface. For this simulation, the operational state of safeguards is manually changed using mouse input from menu selections. For example, in Figure 4, the MAA Portal element is selected from the Protected Area. Figure 4. Selecting a path element that is defined for the facility. Once the element is selected, the safeguards that are available for that element are listed, as shown in Figure 5. The individual safeguards can be turned on or off by checking or un-checking the box in front of each. Degradation can also be applied by highlighting an individual safeguard and using the slider to indicate the percentage of operational value for that safeguard. In the 7
8 example shown in the figure, the Portal Metal Detector is deactivated (failed). The ID Actuated Lock 1 is set to 70% operational (a degradation of 30%). When a change is applied that affects the system effectiveness, the VA algorithms are executed. Figure 5. Manually changing operational status of element safeguards. A continual timeline can also be set up for the DVA Monitor for simulation purposes (See Figure 6). Each bar along the timeline represents a selected period of time (e.g., 1 hour). During the progress of the timeline, the operational state of the physical security system is monitored. During this time, safeguards can be modified as described earlier, different monitoring scenarios can be applied (e.g., daytime vs. nighttime operation, movement of assets, etc), and different guard schedules can be applied. Whenever a change to the security system is made that may affect the system effectiveness, a new VA is automatically performed. Figure 6. DVA of a facility over a continual time period. 8
9 In ASSESS, there are only two conditions that are used (usually relating to daytime and nighttime operations). Each condition may have a different set of safeguards with different performance values. In this DVA project, multiple conditions can be added and different ones can be effective at different times. A sequence may be selected, which refers to a predefined order of events (scenario) over a given time sequence. For example, the time begins at 8:00am with a full guard force and daytime conditions. At 10:00, several guards leave, resulting in a reduced guard force. At 2:00, a scheduled maintenance takes place, removing several of the sensors from the security system. At 4:00 the maintenance should be complete and the sensors are expected to be back online. At 5:00, an off-hours security condition takes effect. Currently, there are two sequences of events that are possible, called Scenario 1 and Scenario 2. The application of different sequences during a given timeline can be selected as shown in Figure 7. More sequences can easily be added as needed for simulation purposes. Also, the selection of a full or reduced size guard force can be made during a given timeline (Figure 8). This capability could be extended to indicate the exact number of guards. This information affects the performance values of different safeguards and also assists the guard force in placing personnel as needed throughout the facility. Figure 7. Sequence selection. Figure 8. Schedule selection. The DVA Response process executes on a separate machine, possibly the Alarm, Communications, and Display (AC&D) system. This provides the operator with a visual display of VA results. The communications line from the DVA Monitor Process is continually polled for updated analysis results. When new results are available, the DVA Response operator is notified and can refresh the display with the new information. The DVA Response process provides information that would allow the guard force to be aware of the most critical paths through the facility at all times. This would grea tly assist in the placement of guards and in strategy decisions made during an actual attack. The operator interface for the proof-of-concept simulation is shown in Figure 9. Here, an ASD is provided as well as a map of the facility. Each time new data is available, the Change Received button turns red. When pressed, the screen is updated with the most critical path through the facility with the shortest response force time. The operator can observe up to ten critical paths that are associated with up to 10 different response force times. The number of critical paths and the response force times available is determined apriori, when the facility file is first created and an analysis profile is determined. 9
10 Figure 9. DVA Operator Interface. In this display, a single high-level map is used to highlight elements in the critical path. Potentially, several layers of maps could be used in order to display path elements, and even safeguards, within buildings and rooms. The level of sophistication of the display would depend on map availability. 5 Summary A need exists to determine the security system effectiveness of a facility on a dynamic basis. Although vulnerability analysis is generally performed bi-annually on a system, the system effectiveness changes continually. This may be due to sensor failures, degradation of sensors over time, removal or replacement of certain safeguards, guard shift changes, unexpected absences of members of the guard force, maintenance schedules, etc. When changes are made to the physical protection system, a new VA is executed, providing immediate results that could greatly influence the placement or movement of security forces and/or assets. A proof-of-concept 10
11 simulation of a system that could detect changes in the security system and automatically produce new VA results was developed for this project. This required accessing and manipulating data files and performance values that are created or maintained by existing VA tools in order to produce results on an as-needed basis. The analysis algorithms used in this simulation were from the Outsider Analysis tools in ASSESS. As long as the data is accessible, algorithms from ATLAS or NEXTGEN could also be used. The simulation shows that system effectiveness could be updated dynamically as system changes occur. Follow-on work that would be beneficial to the concept of dynamic vulnerability analysis is to deploy the DVA Monitor and DVA Response processes in a real facility environment that uses the standard set of VA tools. 11
12 Distribution 1 MS 0232 H. R. Westrich, Stephen Ortiz, Cynthia L. Nelson, MS 9018 Central Technical Files, Technical Library,
Penetration Testing of Industrial Control Systems
SF-1075-SUR (8-2005) SANDIA REPORT SAND2005-2846P Unlimited Release Printed March, 2005 Penetration Testing of Industrial Control Systems David P. Duggan Prepared by Sandia National Laboratories Albuquerque,
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
Laser Safety Audit and Inventory System Database
SAND REPORT SAND2003-1144 Unlimited Release Printed May 2003 Laser Safety Audit and Inventory System Database Arnold L. Augustoni Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Shock Response of Diamond Crystals
SANDIA REPORT SAND2001-3838 Unlimited Release Printed December 2001 Shock Response of Diamond Crystals Marcus D. Knudson, James R. Asay, Scott C. Jones and Yogi M. Gupta Prepared by Sandia National Laboratories
COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS. M. J. Hicks
t 3532 @olo'f4478g /Og-..q ~~~~~~ COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS M. J. Hicks Security Systems Analysis and Development Department, 5845 Sandia National Laboratories,Albuquerque,
VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point
VULNERABILITY ASSESSMENT Correctional Facilities Are Only as Secure as Their Weakest Point Today's correctional security system is a complex configuration of personnel, procedures, detection, delay and
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Measurement of BET Surface Area on Silica Nanosprings
PNNL-17648 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Measurement of BET Surface Area on Silica Nanosprings AJ Karkamkar September 2008 DISCLAIMER This report was prepared
Process for Selecting Engineering Tools Applied to Selecting a SysML Tool
SANDIA REPORT SAND2010-7098 Unlimited Release February 2011 Process for Selecting Engineering Tools Applied to Selecting a SysML Tool Kent de Jong, Mark J. De Spain, Marjorie E. Hernandez, Debbie S. Post,
Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA)
Technical Report NREL/TP-56-588 January 3 Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA) Quarter 3 Composite Data Products Jennifer Kurtz, Keith Wipke, Sam Sprik, Todd Ramsden,
Drupal Automated Testing: Using Behat and Gherkin
PNNL-23798 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Drupal Automated Testing: Using Behat and Gherkin Thomas Williams [email protected] Carolyn Wolkenhauer [email protected]
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy. DISCLAIMER This report was prepared as an account of work sponsored
Situated Usability Testing for Security Systems
PNNL-20201 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Situated Usability Testing for Security Systems FL Greitzer February 2011 DISCLAIMER This report was prepared as an
Systems Engineering Management Plans
SANDIA REPORT SAND2009-7836 Unlimited Release Printed October 2009 Systems Engineering Management Plans Tamara S. Rodriguez Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
Optical Blade Position Tracking System Test
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Optical Blade Position Tracking
LEADERSHIP DEVELOPMENT STUDY
SANDIA REPORT SAND 25-28 Unlimited Release Printed April 25 LEADERSHIP DEVELOPMENT STUDY Success Profile Competencies and High-Performing Leaders at Sandia National Laboratories Deborah R. Mulligan, Ph.
Small PV Systems Performance Evaluation at NREL's Outdoor Test Facility Using the PVUSA Power Rating Method
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Small PV Systems Performance
Risk D&D Rapid Prototype: Scenario Documentation and Analysis Tool
PNNL-18446 Risk D&D Rapid Prototype: Scenario Documentation and Analysis Tool Report to DOE EM-23 under the D&D Risk Management Evaluation and Work Sequencing Standardization Project SD Unwin TE Seiple
Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment
SANDIA REPORT SAND2007-7328 Unlimited Release November 2007 Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment Raymond C. Parks Prepared by Sandia National Laboratories Albuquerque,
NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning
ORNL/TM-2012/246 NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning Preliminary Report (NEAMS Milestone M4MS-12OR0608113) Version 1.0 (June 2012) David E.
Energy Systems Integration
Energy Systems Integration A Convergence of Ideas Ben Kroposki, Bobi Garrett, Stuart Macmillan, Brent Rice, and Connie Komomua National Renewable Energy Laboratory Mark O Malley University College Dublin
The Production Cluster Construction Checklist
ARGONNE NATIONAL LABORATORY 9700 South Cass Avenue Argonne, IL 60439 ANL/MCS-TM-267 The Production Cluster Construction Checklist by Rémy Evard, Peter Beckman, Sandra Bittner, Richard Bradshaw, Susan Coghlan,
The Design Process of Physical Security as Applied to a U.S. Border Port Of Entry
The Design Process of Physical Security as Applied to a U.S. Border Port Of Entry George G. Wagner Sandia National Laboratories MS 0762, Albuquerque, NM 87185 ABSTRACT This paper describes the design process
W. C. Reinig. Savannah River Laboratory E. I. du Pent de Nemours and Company Aiken, South Carolina 298o1
.*. *.-a /dp73j/3~ DP-MS-68-48 calforn1um-252: A NEW SOTOPC SOUR(!EFOR NEUTRON RADOGRAPHY by W. C. Reinig Savannah River Laboratory E.. du Pent de Nemours and Company Aiken, South Carolina 298o1. SRL7
Regional Field Verification Operational Results from Four Small Wind Turbines in the Pacific Northwest
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Regional Field Verification Operational
Critical Infrastructure Protection and the Evaluation Process
Critical Infrastructure Protection and the Evaluation Process Martin Hromada and Ludek Lukas Department of Security Engineering Faculty of Applied Informatics, Tomas Bata Univerzity in Zlín, Nad Stráněmi
Asynchronous data change notification between database server and accelerator control systems
BNL-95091-2011-CP Asynchronous data change notification between database server and accelerator control systems W. Fu, S. Nemesure, J. Morris Presented at the 13 th International Conference on Accelerator
WeaselBoard: Zero-Day Exploit Detection for Programmable Logic Controllers
SANDIA REPORT SAND2013-8274 Unlimited Release Printed October, 2013 WeaselBoard: Zero-Day Exploit Detection for Programmable Logic Controllers John Mulder, Moses Schwartz, Michael Berg, Jonathan Roger
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Elastomer Compatibility Testing of Renewable Diesel Fuels
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy Elastomer Compatibility Testing
Automated Transportation Management System
- BOE/RL-93-52 Rev. 1 Automated Transportation Management System (ATMS) Configuration Management Plan /, MAR 2 2 1995 OSTI 1 United States Department of Energy Richland, Washington - Approved for Public
Nuclear Engineering Enrollments and Degrees Survey, 2013 Data
Nuclear Engineering Enrollments and Degrees Survey, 2013 Data Number 72 Oak Ridge Institute for Science and Education 2014 SURVEY UNIVERSE The survey includes degrees granted between September 1, 2012
Improving a Gripper End Effector
PNNL-13440 Improving a Gripper End Effector OD Mullen CM Smith KL Gervais January 2001 Prepared for the U.S. Department of Energy under Contract DE-AC06-76RL01830 DISCLAIMER This report was prepared as
NREL Job Task Analysis: Crew Leader
NREL Job Task Analysis: Crew Leader Chuck Kurnik National Renewable Energy Laboratory Cynthia Woodley Professional Testing Inc. NREL is a national laboratory of the U.S. Department of Energy, Office of
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) SUNG SOON JANG *, SUNG-WOO KWAK, HOSIK YOO, JUNG-SOO KIM
2-DFINITE ELEMENT CABLE & BOX IEMP ANALYSIS
P 7. I 2-DFINITE ELEMENT CABLE & BOX IEMP ANALYSIS - "L C. David Turner and Gary J. Scrivner Sandia National Laboratories Albuquerque, NM 87185-1152 a ABSTRACT and multiple dielectric regions. The applicable
Sandia Data Archive (SDA) file specifications
SANDIA REPORT SAND2015-1118 Unlimited Release Printed March 2015 Sandia Data Archive (SDA) file specifications Daniel H. Dolan and Tom Ao Prepared by Sandia National Laboratories Albuquerque, New Mexico
DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS
Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS
Nuclear Engineering Enrollments and Degrees Survey, 2014 Data
Nuclear Engineering Enrollments and Degrees Survey, 2014 Data Number 74 Oak Ridge Institute for Science and Education 2015 SURVEY UNIVERSE The 2014 survey includes degrees granted between September 1,
Derived Intervention Levels for Tritium Based on Food and Drug Administration Methodology Using ICRP 56 Dose Coefficients (U)
.' I Keywords: Retention: Tritium ICRP 56 Dose Coefficients Derived Intervention Level Lifetime Derived Intervention Levels for Tritium Based on Food and Drug Administration Methodology Using ICRP 56 Dose
RAVEN: A GUI and an Artificial Intelligence Engine in a Dynamic PRA Framework
INL/CON-13-28360 PREPRINT RAVEN: A GUI and an Artificial Intelligence Engine in a Dynamic PRA Framework ANS Annual Meeting C. Rabiti D. Mandelli A. Alfonsi J. J. Cogliati R. Kinoshita D. Gaston R. Martineau
Climate-Weather Modeling Studies Using a Prototype Global Cloud-System Resolving Model
ANL/ALCF/ESP-13/1 Climate-Weather Modeling Studies Using a Prototype Global Cloud-System Resolving Model ALCF-2 Early Science Program Technical Report Argonne Leadership Computing Facility About Argonne
WinMagic Encryption Software Installation and Configuration
WinMagic Encryption Software Installation and Configuration Don Mendonsa, Faranak Nekoogar, Harry Martz Lawrence Livermore National Laboratory Livermore, CA 94551 Work performed on the Science & Technology
NGNP Risk Management Database: A Model for Managing Risk
INL/EXT-09-16778 Revision 1 NGNP Risk Management Database: A Model for Managing Risk John M. Beck November 2011 DISCLAIMER This information was prepared as an account of work sponsored by an agency of
Y-12 EMBOS Medical Lab Interface Batch Loader
DOE-FIU SCIENCE & TECHNOLOGY WORKFORCE DEVELOPMENT PROGRAM STUDENT SUMMER INTERNSHIP TECHNICAL REPORT June 4, 2012 to August 10, 2012 Y-12 EMBOS Medical Lab Interface Batch Loader Principal Investigators:
How To Find Out If The Winds From The Oak Ridge Site Are Calm
EVALUATING THE WIND DATA FROM THE AUTOMATED SURFACE OBSERVING SYSTEM IN OAK RIDGE, TENNESSEE - IS KOQT THE CALMEST SITE IN THE US? Thomas E. Bellinger, CCM Y-12 National Security Complex Oak Ridge, Tennessee
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX Thomas E. Bellinger, CCM Y-12 National Security Complex Oak Ridge, Tennessee 1. INTRODUCTION To better serve the needs of the
User Guide. The Business Energy Dashboard
User Guide The Business Energy Dashboard 1 More Ways to Understand and Control Your Energy Use At FPL, we re investing in smart grid technologies as part of our commitment to building a smarter, more reliable
Selecting RMF Controls for National Security Systems
SANDIA REPORT SAND2015-6770 Unlimited Release Printed August 2015 Selecting RMF Controls for National Security Systems Edward L. Witzke Prepared by Sandia National Laboratories Albuquerque, New Mexico
Patch Management Marvin Christensen /CIAC
Patch Management Marvin Christensen /CIAC US DOE Cyber Security Group 2004 Training Conference May 26, 2004 Management Track 11:00 am 11:45 pm UCRL-CONF-204220 CIAC 04-099 This work was performed under
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012
Proposal: Application of Agile Software Development Process in xlpr ORNL- 2012/41412 November 2012 Prepared by Hilda B. Klasky Paul T. Williams B. Richard Bass This report was prepared as an account of
CARVER+Shock. Jeffrey J. Danneels Department Manager Sandia National Laboratories Albuquerque, NM
Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000.
Human Dimension in Cyber Operations Research and Development Priorities
Human Dimension in Cyber Operations Research and Development Priorities Chris Forsythe a, Austin Silva a, Susan Stevens-Adams a, Jeffrey Bradshaw b a Sandia National Laboratories, Albuquerque, NM, USA,
Asset Track Getting Started Guide. An Introduction to Asset Track
Asset Track Getting Started Guide An Introduction to Asset Track Contents Introducing Asset Track... 3 Overview... 3 A Quick Start... 6 Quick Start Option 1... 6 Getting to Configuration... 7 Changing
Active Vibration Isolation of an Unbalanced Machine Spindle
UCRL-CONF-206108 Active Vibration Isolation of an Unbalanced Machine Spindle D. J. Hopkins, P. Geraghty August 18, 2004 American Society of Precision Engineering Annual Conference Orlando, FL, United States
Wind Forecasting stlljectives for Utility Schedule and Energy Traders
NREUCP 500 24680 UC Category: 1210 Wind Forecasting stlljectives for Utility Schedule and Energy Traders Marc N. Schwartz National Renewable Energy Laboratory Bruce H. Bailey A WS Scientific, Inc. Presented
Published April 2010. Executive Summary
Effective Incident, Problem, and Change Management Integrating People, Process, and Technology in the Datacenter Published April 2010 Executive Summary Information technology (IT) organizations today must
User Guide. The Business Energy Dashboard
User Guide The Business Energy Dashboard 1 More Ways to Understand and Control Your Energy Use At FPL, we re investing in smart grid technologies as part of our commitment to building a smarter, more reliable
Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems
United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water
Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)
Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed
Configuring Outlook 2011 for Mac with Google Mail
Configuring Outlook 2011 for Mac with Google Mail This document assumes that you already have Outlook 2011 installed on your computer and you are ready to configure Outlook with Google Mail. Table of Contents
Secure SCADA Communication Protocol Performance Test Results
PNNL-17118 Secure SCADA Communication Protocol Performance Test Results M.D. Hadley K.A. Huston August 2007 Prepared for U.S. Department of Energy Office of Electricity Delivery and Energy Reliability
During the Clinton administration, the
8 UNIVERSITIES COUNCIL ON WATER RESOURCES ISSUE 129, PAGES 8-12, OCTOBER 2004 Assessing the Vulnerabilities of U.S. Drinking Water Systems Jeffrey J. Danneels and Ray E. Finley Sandia National Laboratories
Security Metrics for Process Control Systems
SANDIA REPORT SAND2007-2070P Unlimited Release September 2007 Security Metrics for Process Control Systems Annie McIntyre, Blair Becker, Ron Halbgewachs Prepared by Sandia National Laboratories Albuquerque,
A New Empirical Relationship between Thrust Coefficient and Induction Factor for the Turbulent Windmill State
National Renewable Energy Laboratory Innovation for Our Energy Future A national laboratory of the U.S. Department of Energy Office of Energy Efficiency & Renewable Energy A New Empirical Relationship
CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool
INL/CON-07-12810 PREPRINT CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool ISA Expo 2007 Kathleen A. Lee January 2008 This is a preprint of a paper intended for publication in a journal
How To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
Threat Analysis Framework
SANDIA REPORT SAND2007-5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
System Specification. Author: CMU Team
System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect
Simulating Aftershocks for an On Site Inspection (OSI) Exercise
LLNL-TR-677873 Simulating Aftershocks for an On Site Inspection (OSI) Exercise J. J. Sweeney, S. R. Ford October 5, 2015 Disclaimer This document was prepared as an account of work sponsored by an agency
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Configuring Outlook 2016 for Windows
Configuring Outlook 2016 for Windows This document assumes that you already have Outlook 2016 installed on your computer and you are ready to configure Outlook. Table of Contents Configuring Outlook 2016
