DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS
|
|
|
- Elvin Price
- 9 years ago
- Views:
Transcription
1 Proceedings of the 1998 Winter Simulation Conference D.J. Medeiros, E.F. Watson, J.S. Carson and M.S. Manivannan, eds. DISCRETE-EVENT SIMULATION FOR THE DESIGN AND EVALUATION OF PHYSICAL PROTECTION SYSTEMS Sabina E. Jordan, Mark K. Snell, and Marcella M. Madsen Sandia National Laboratories Department 5838, Mail Stop Eubank Blvd. Southeast Albuquerque, NM 87123, U.S.A. Jeffrey S. Smith and Brett A. Peters Texas A&M University Industrial Engineering Department 238 Zachry Engineering Center College Station, TX , U.S.A. ABSTRACT This paper explores the use of discrete-event simulation for the design and control of physical protection systems for fixed-site facilities housing items of significant value. It begins by discussing several modeling and simulation activities currently performed in designing and analyzing these protection systems and then discusses capabilities that design/analysis tools should have. The remainder of the article then discusses in detail how some of these new capabilities have been implemented in software to achieve a prototype design and analysis tool. The simulation software technology provides a communications mechanism between a running simulation and one or more external programs. In the prototype security analysis tool, these capabilities are used to facilitate human-in-the-loop interaction and to support a real-time connection to a virtual reality (VR) model of the facility being analyzed. This simulation tool can be used for both training (in realtime mode) and facility analysis and design (in fast mode). 1 GENERAL PROBLEM This paper examines the problem of designing and analyzing physical security systems that protect fixed-site facilities against intrusions by external threats as well as unauthorized acts by insiders. To function properly, these systems must first detect the adversary act, delay the progress of the adversary, and respond (typically with guards) to the intrusion or act. Proper design and/or analysis of these systems include determining how well these functions work alone and in combination. For the purposes of this paper, we will differentiate between analysis functions and design functions by stating that analysis looks at the effectiveness of existing systems while design consists of creating new systems or modifying existing systems. The following four modeling and simulation steps are currently performed as part of this design/analysis process: 1. Determining the performance of different detection and delay features, such as sensors and locks and entry control procedures, against the adversary (in terms of how they can be defeated, or the time or probability of detection involved in defeating them). 2. Determining whether alarm/assessment systems and entry control networks operate quickly and reliably enough to allow the guard force to determine that a security response should be started. 3. Determining whether there is enough delay built into the physical protection system, once the adversary has been detected, to allow the response team to interrupt that is, arrive in time to confront the adversary. 4. Determining how capable the response forces are at defeating the adversary in a battle, if one ensues, taking into account the numbers of combatants on both sides, their weapons, tactics, and other factors. The first two analysis steps consist of inspecting the actual or designed system and performing or reviewing performance tests. Examples of performance tests include: trying to see if testers with false badges can pass through entry control points, conducting explosive attacks on doors, recording the processing times and operator decisions for simulated intrusions through sensors, and performing limited exercises to determine response force times. Historically, physical protection systems have been simple enough that interactions between subsystems did not need to be modeled. In those areas where systems had some interactions such as perimeter alarm sensing and assessment actual installations of the equipment were often used to investigate these issues. Where systems were being designed, this often meant that physical test beds had to be built on site. The latter two analysis steps determine how effectively the physical security system protects against the 899
2 Jordan, Snell, Madsen, Smith and Peters Figure 1: Comparison of Level of Analysis Realism and Cost-Per Scenario of Analysis for Existing Security Analytical Tools and Human-in-the-Loop Simulations adversary. The third step produces a number of attack scenarios that stress detection and delay in the system. These scenarios, either identified by expert judgement or optimal path algorithms, are then played out in human-inthe-loop combat to evaluate how effective response tactics and weapons are, if response occurs early enough. Figure 1 shows, qualitatively, the relationship between cost of analysis per scenario examined and level of analysis realism for analysis tools we currently use for steps 3 and 4 of the design/analysis process. By cost of analysis we mean primarily the manpower costs involved with collecting site information, entering it into analysis databases, modeling/simulating the scenario, and documenting the results. Analysis realism refers to how much of the detail of the actual system performance is realistically incorporated in the model (this is defined in more detail below). Low-detail tools, such as SAVI Systematic Analysis of Vulnerability to Intrusion described in Matter (1988), are used during step 3 to identify the paths with the lowest estimate of probability of interruption. (Probability of interruption is defined as the probability that detection occurs early enough that the response can intercept the adversary within the response force time). These tools incorporate simple analytical models that use point estimates of detection probabilities, delay times, and response force time. On the other hand, we use fairly detailed human-in-the-loop combat to address response issues. Table 1 lists 6 levels of analysis realism that can be used for performing security analysis. The term Detailed performance models for detection and delay models mentioned at level 3 can range from time-dependent parametric models to physics-based models of sensors or barriers. Table 2 compares the relative cost of each level of analysis realism. Due to the complexity of the problem, analytical security models such as SAVI stop at level 1 detail. Smith et al. (1998) also describe a level 1 analysis method using the simulation model described in this paper. At the other end of the spectrum, currently used combat fall at levels 5 or 6. That is, the combat are driven primarily by human participants. This leaves a gap of several layers of analysis realism that have not been adequately addressed. These levels can be covered imperfectly now by either attempting to alter the data for simple analytical tools to try to approximate the problem, performing what are called table-top analyses using experts, or using the level 5 or 6 simulation tools and valuable human player time to address the questions. 900
3 Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems Table 1: Levels of Analysis Detail Level Type of Model Level of Detail of Detection and Delay Models How Guard-Adversary Combat is Modeled 1 Analytical Parameters set using point estimates and/or Point estimates of Response Force Time (point estimates) aggregated values 2 Analytical Parameters set using distributions based on Distributions for Response Force Time (stochastic) 3 Stochastic with simple models 4 Stochastic using agents 5 Stochastic using human commanders 6 Stochastic using human participants tests and/or uncertainty Node Adjacency models if guards, at node i, see/are seen by adversaries at node j, what is the probability guards win the ensuing confrontation? Computerized agents represent the behavior of security and/or adversary personnel. Humans play the role of security or adversary commanders in the simulation. Humans play the role of specific security or adversary personnel in the simulation. Table 2: Relative Costs/Per Scenario for Each Level of Analysis Detail Level Type of Model Cost/Scenario of Analysis 1 Analytical (point estimates) Very low use classical optimization techniques to find an answer without explicitly addressing each scenario 2 Analytical (stochastic) Low individual scenarios are quickly analyzed but more scenarios need to be examined to find optimal ones 3-4 Stochastic with simple models and/or automated agents 5 Stochastic with humans serving as commanders 6 Stochastic with humans serving as participants Moderate: Replications of each option need to be performed, with each replication modeling more details than the analytical models. May run faster than real time if run in a batch mode or in real-time if analyst/trainee interacts with system. High: Several (2+) human players must be involved in performing each replication of each scenario in essentially real-time. Very High: Up to dozens of human players must be involved in performing each replication of each scenario in essentially real-time. There are several valuable analysis questions that can best be addressed with tools covering these intermediate levels of detail (levels 2-4): Question: What is the value of detection by roving guards and area surveillance systems that are more complex than the line sensors used in the past? In some cases, a physics-based model of system performance may be required to fully evaluate these systems. There are also questions of where to place these sensors in two- or three-dimensional environments that don t arise when designing perimeter systems either you alarm the entire perimeter or you don t. Question: How do we model cases where we want to see the effect of detailed scenario factors, such as weight of equipment adversaries are carrying, the number of adversaries attacking a barrier or sneaking past a sensor, or the uncertainty in the results due to limited testing? Question: What is the effect on timeliness of the response of factors that may merely slow the response down such as command and control problems or adversary diversions without taking account (yet) for combat between the response and adversaries? In 901
4 Jordan, Snell, Madsen, Smith and Peters some of these cases, the response may not arrive in time so the ability to model combat is superfluous. Training need: How can a response commander be trained to make use of alarm system data to quickly close in on and engage adversary forces without having to perform a level 5 or 6 analysis?s Having identified a need for a new design and analysis capability, we will now discuss a prototype tool developed for providing these level 2-4 capabilities. 2 APPROACH TO THE PROBLEM This research grew out of a realization that the security modeling requirements for levels 1-3 of analysis detail, that focus on detection and delay, could be met by an adaptation of a real-time simulation originally developed for controlling flexible manufacturing systems (Drake and Smith, 1996; Peters et al., 1996). The general concept of using real-time simulation for manufacturing involves developing a single simulation model for analysis as well as shop floor control thus reducing software development costs. Like the manufacturing, of security systems require several levels of detail and may, in some cases, need to interact with actual security system components. The detail level can range from the entire system being simulated to the entire system being real. The development of separate software logic for all levels of detail causes duplication of effort and creates difficulty in maintaining consistency. Building on the previous research in the manufacturing control domain that led to the development of Arena RT TM, this research extends the concept of single simulation logic for analysis and control to security systems simulation. After the initial development of the simulation-based security system, it became apparent that the Arena RTbased system could also be extended to cover level 4 of analysis detail. Following is a brief overview of the simulation system that was developed for this purpose. Additional details about the simulation and the level 1-3 analyses see Smith et al. (1998). 3 SIMULATION DESCRIPTION In the security simulation the facility layout is modeled as a graph. The nodes of the graph represent points along paths and positions of security features (doors, portals, gates, etc). Often there are or more sensors installed on or around these security features (e.g., motion detectors, cameras, etc.). Arcs connecting nodes represent paths. For example, a corridor in a building can be modeled using two nodes (one for each end of the corridor) and an arc joining the two nodes. The security features associated with each node determine the delay time and detection probability at that location. For example, a node representing a door would have a time associated with opening the (potentially locked) door and a probability of this action being detected by an installed sensor. Each arc has a delay time based on the travel time between the locations represented by the connected nodes. The response team and the intruder behaviors determine the travel paths. As the simulation progresses, intruder entities and guard entities move through the building graph and interact with one another. Events occur probabilistically when entities (intruders and guards) arrive at nodes. Events include detection, interruption, and neutralization. The simulation logic is quite straightforward, since much of the processing is performed in the VBA code. Arc Delay Current Node Check for Detection Check for Interruptions Delay to Disable or Traverse Node Route to Next Node IF Yes Dispatch or Reroute Guard Figure 2: Entity Logic for the Intruder Detection Simulation 902
5 Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems Figure 2 illustrates the logic as entities move through the system. Entities move from node to node through the graph, incurring the corresponding node and arc delays. Upon arrival at a node, the simulation checks for detection by sensors and/or guard/adversary interruptions. When intruders or guards are neutralized or when intruders reach the target, the corresponding entities are destroyed. 3.1 Entity Behavior In a real security application, the intruders goal can be simply to reach the target (e.g., where sabotage is the objective) or can be to retrieve the target and escape (e.g., where theft is the objective). The guards goal is to neutralize the intruders. When intruder and guard entities come into contact with one another (called interruption), a battle ensues. The result of the battle is either neutralization of the intruder, neutralization of the guard, neutralization of both, or neutralization of neither. Interruption and battle outcome are probabilistic events based on the location of the two associated entities. The simulation model tracks the probability that intruders are detected, the probability that intruders are neutralized, and the expected time remaining before the intruder reaches the target when neutralization occurs. These performance metrics are used to evaluate the security system design. Although the simulation logic is straightforward, implementing entities behaviors within the simulation framework has proven to be quite interesting. In the manufacturing control models on which the security models are based, part routes are determined in advance and can be changed at the discretion of the shop floor control system. The analogous behavior for intruder entities is for them to follow a fixed path through the facility graph. Similarly, for guard entities, the analogous behavior is to either follow a fixed path to the target upon intruder detection, or to follow a preset patrol through the facility. Behaviors become even more interesting when entities interact with one another. For example, if an intruder sees a guard, one logical behavior would be to exit the facility (i.e., run away). Similarly, taking the shortest path to the location of a detection or chasing an intruder would be logical behaviors for the guard. These types of behaviors have been implemented in the current version of the simulation. Cooperative behaviors (where multiple guards or intruders cooperate with one another in order to meet an objective) represent the next level of complexity. Cooperative behaviors have not yet been implemented in the simulation system. For simple behaviors, entity routes can easily be handled using the SEQUENCES element in the Arena modeling language. However, in order to implement more complex behaviors, entity routes are determined manually in a VBA block rather than using the traditional SEQUENCES element. This allows arbitrarily complex and dynamic routing logic to be used. For example, a shortest path algorithm can be used to find an egress path from the current node if the intruder is trying to escape after being detected. Figure 3 shows the structure of the current simulation system. As shown on the left side of the simulation block in Figure 3, the network layout, initial intruder paths, and sensor information are stored in an Access database. This information is read in the VBA blocks through DAO (data access objects) links. This allows us to easily create/use the facility data in other design and analysis applications. Peters et al. (1996), Smith et al. (1998), and Peters and Smith (1998) provide a complete description of this integration between Arena and Access. Access VBA Arena VB Guard Console Network Layout Intruder Paths Sensor Configurations Sensor Characteristics Experimental Design Input Data Model Results Simulation Model Sensor states, entity locations Entity movement instructions Guard Console Entity locations and states, sensor states Virtual Reality System Figure 3: Simulation Structure 903
6 Jordan, Snell, Madsen, Smith and Peters 3.2 Real-Time Command and Control through a Guard Console By incorporating the real-time communication features of Arena RT, the simulation system can begin to move to level 5 analysis. At this level, humans play the role of commanders for the guards, the adversaries, or both. The system structure for the real-time component is shown on the right side of the simulation block in Figure 3. The Guard Console provides a graphical view of the facility and displays real-time sensor state and entity location information. The simulation updates this information on a user-defined interval. In addition, the human commander can instruct entities to move to specified locations represented by nodes in the facility graph. These instructions are sent to the simulation through the VBA code responsible for routing entities. When an entity currently located at node i is instructed to go to node j, the VBA code determines the shortest path between nodes i and j and implements the path as the entity s route. The level 5 analysis in this context is useful in several ways. The system can be used to analyze the system performance under the control of experienced command personnel providing for very complex (even cooperative) behavior. The system can be used as a simulator in training exercises where the goal is to train command and control personnel. In addition, the system can be used to identify and formalize command and control behaviors that can be later coded and included as part of the level 3-4 analyses. 3.3 Integration with a VR System In addition to the guard console connection, the simulation system also integrates with a virtual reality (VR) system, providing the ability for non-analysts to visualize scenarios run in the simulation. The simulation model sends entity location and state and sensor state information to the VR system through a network connection on a user-defined interval (typically once per second). The VR system uses this information to dynamically render the virtual environment and avatars. The current implementation provides for 3 rd party viewing of the simulation in the VR environment. That is, people can move through the virtual environment and observe intruders and guards. Future work in this area will focus on allowing interaction with the running simulation through the VR environment. That is, a person will be able to play an intruder or guard in the virtual environment. 4 CONCLUSIONS This paper describes the use of a discrete event simulationbased model for the design and control of physical protection systems. The system bridges the gap in the levels of analysis detail that exists in current security analysis tools. The key technology is the ability to have a communications mechanism between a running simulation and one or more external programs. A prototype security analysis tool was developed to allow human-in-the-loop interaction and to support a real-time connection to a virtual reality (VR) model of the facility being analyzed. This simulation tool is used for both facility analysis and design (in fast mode) and guard and supervisor training (in real-time mode). REFERENCES Drake, G. R. and Smith, J. S., Simulation System for Real-time Planning, Scheduling, and Control, Proceedings of the 1996 Winter Simulation Conference, December 1996, Coronado, CA. Matter, J.C., SAVI: A PC-Based Vulnerability Assessment Program, SAND , July Peters, B. A. and Smith, J. S., Real-time Simulation- Based Shop Floor Control, Proceedings of ArenaSphere 98, June 1998, Pittsburgh, PA. Peters, B. A., Smith, J. S., Curry, J., LaJimodiere, C. and Drake, G. R., Advanced Tutorial Simulation-Based Scheduling and Control, Proceedings of the 1996 Winter Simulation Conference, December 1996, Coronado, CA. Smith, J. S., Peters, B.A., Curry, J., and Gupta, D., Prototype Software Model for Designing Intruder Detection Systems with Simulation, Aerosense 98 Modeling, Visualization, and Simulation Conference, April 13-17, 1998, Orlando, FL. AUTHOR BIOGRAPHIES SABINA E. JORDAN is a Principal Member of the Technical Staff at Sandia National Laboratories. She has been involved in safeguards and security R&D for the past ten years, including security vulnerability assessment tool development. She holds a B.S. degree in Computer Engineering from the University of New Mexico and an M.S. degree in Electrical Engineering from the University of Southern California. MARK K. SNELL is a Principal Member of the Technical Staff at Sandia National Laboratories. He has been involved in developing and using security vulnerability assessment tools since He holds a B. S. degree in Economics from Syracuse University and a Ph.D. in Operations Research from Cornell University. MARCELLA M. MADSEN is a Distinguished Member of the Technical Staff at Sandia National Laboratories. She was project leader for development of risk assessments for radioactive material transportation in the 1980s and has 904
7 Discrete-Event Simulation for the Design and Evaluation of Physical Protection Systems been involved in program management for nuclear weapon security for the past 6 years. She holds a B. S. degree in Mathematics from the University of Minnesota and an M. A. in Mathematics from the University of New Mexico. JEFFREY S. SMITH is an Associate Professor in the Department of Industrial Engineering at Texas A&M University. His research interests are in computer-aided manufacturing, shop floor control, and discrete event simulation. He holds a BSIE degree from Auburn University and MSIE and Ph.D. degrees from Penn State University. BRETT A. PETERS is an Associate Professor in the Department of Industrial Engineering at Texas A&M University. His research interests are in facility location and design, computer-aided manufacturing, and logistics. He holds a BSIE degree from the University of Arkansas and MSIE and Ph.D. degrees from the Georgia Institute of Technology. 905
VULNERABILITY ASSESSMENT. Correctional Facilities Are Only as Secure as Their Weakest Point
VULNERABILITY ASSESSMENT Correctional Facilities Are Only as Secure as Their Weakest Point Today's correctional security system is a complex configuration of personnel, procedures, detection, delay and
A Risk Assessment Methodology (RAM) for Physical Security
A Risk Assessment Methodology (RAM) for Physical Security Violence, vandalism, and terrorism are prevalent in the world today. Managers and decision-makers must have a reliable way of estimating risk to
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Critical Infrastructure Protection and the Evaluation Process
Critical Infrastructure Protection and the Evaluation Process Martin Hromada and Ludek Lukas Department of Security Engineering Faculty of Applied Informatics, Tomas Bata Univerzity in Zlín, Nad Stráněmi
COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS. M. J. Hicks
t 3532 @olo'f4478g /Og-..q ~~~~~~ COST AND PERFORMANCE ANALYSIS OF PHYSICAL SECURITY SYSTEMS M. J. Hicks Security Systems Analysis and Development Department, 5845 Sandia National Laboratories,Albuquerque,
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE)
DEVELOPMENT OF A VULNERABILITY ASSESSMENT CODE FOR A PHYSICAL PROTECTION SYSTEM: SYSTEMATIC ANALYSIS OF PHYSICAL PROTECTION EFFECTIVENESS (SAPE) SUNG SOON JANG *, SUNG-WOO KWAK, HOSIK YOO, JUNG-SOO KIM
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response
Elements of Physical Security Systems II: Intrusion Detection, Alarm Communication and Assessment, Delay, and Response International Biological Threat Reduction Department Sandia National Laboratories
Security at San Onofre
Security at San Onofre April 16, 2015 Ross Quam Security Manager Overview 1. Mission 2. Adversary Characteristics 3. Plans and Procedures 4. Insider Mitigation 5. Local Law Enforcement Agency Support 2
CALL CENTER SCHEDULING TECHNOLOGY EVALUATION USING SIMULATION. Sandeep Gulati Scott A. Malcolm
Proceedings of the 2001 Winter Simulation Conference B. A. Peters, J. S. Smith, D. J. Medeiros, and M. W. Rohrer, eds. CALL CENTER SCHEDULING TECHNOLOGY EVALUATION USING SIMULATION Sandeep Gulati Scott
Security for Railways and Metros
Security for Railways and Metros Security for Railways and Metros Security Management System Railways and Metros worldwide share a set of characteristics that make them very vulnerable to possible attacks,
U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of physical security
NUREG-0800 U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN 13.6.2 PHYSICAL SECURITY DESIGN CERTIFICATION REVIEW RESPONSIBILITIES Primary - Organization responsible for the review of physical security
Building Integration System Your platform for customized security and safety management
Building Integration System Your platform for customized security and safety management 2 One platform for everything Efficient building management is becoming not only more important, but also a more
Science/Safeguards and Security. Funding Profile by Subprogram
Safeguards and Security Safeguards and Security Funding Profile by Subprogram (dollars in thousands) Protective Forces 35,059 37,147 Security Systems 11,896 10,435 Information Security 4,655 4,595 Cyber
Remote Guarding. The traditional guarding functions that you depend on can now be performed remotely.
Remote Guarding Remote Guarding The traditional guarding functions that you depend on can now be performed remotely. When you have Remote Guarding managed by Securitas USA, we act on incidents in real-time
Tyco Integrated Security Managed Video Services. Gain enhanced security by leveraging your existing video surveillance equipment investment
MONITORING ACCESS CONTROL VIDEO SURVEILLANCE INTRUSION DETECTION FIRE & LIFE SAFETY COMMERCIAL SOLUTIONS Tyco Integrated Security Managed Video Services Gain enhanced security by leveraging your existing
Building Integration System Your platform for customized security and safety management
A Tradition of Quality and Innovation For 12 years, the Bosch name stands for quality and reliability. Bosch is the global supplier of choice for innovative technology, backed by the highest standards
Title: Integrating Management of Truck and Rail Systems in LA. INTERIM REPORT August 2015
Title: Integrating Management of Truck and Rail Systems in LA Project Number: 3.1a Year: 2013-2017 INTERIM REPORT August 2015 Principal Investigator Maged Dessouky Researcher Lunce Fu MetroFreight Center
The Design Process of Physical Security as Applied to a U.S. Border Port Of Entry
The Design Process of Physical Security as Applied to a U.S. Border Port Of Entry George G. Wagner Sandia National Laboratories MS 0762, Albuquerque, NM 87185 ABSTRACT This paper describes the design process
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Physical Security for Drinking Water Facilities
Physical Security for Drinking Water Facilities December, 2009 State of Oregon Oregon Health Authority Drinking Water Program In Association with The City of Gresham Water Utilities The City of Portland
Physical Security Simulation and Analysis Tools A presentation for the Canada & United States Security Simulation Technologies Group
SAND 2014-3718P Physical Security Simulation and Analysis Tools A presentation for the Canada & United States Security Simulation Technologies Group Unclassified Unlimited Information For Public Dissemination
How to Solve the Most Persistent Problem in Perimeter Security Systems
How to Solve the Most Persistent Problem in Perimeter Security Systems Duane Thompson General Manager of Fiber SenSys Carrondo, Antonio Commercial Manager, Teleprinta Perimeter Security Challenging!! More
QUEST The Systems Integration, Process Flow Design and Visualization Solution
Resource Modeling & Simulation DELMIA QUEST The Systems Integration, Process Flow Design and Visualization Solution DELMIA QUEST The Systems Integration, Process Flow Design and Visualization Solution
Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems
United States Environmental Protection Agency Enhanced Security Monitoring Primer For Water Quality Surveillance and Response Systems Office of Water (M 140) EPA 817-B-15-002B May 2015 Introduction A Water
WEBFIL LIMITED. Your Security Partner
WEBFIL LIMITED Your Security Partner ABOUT THE COMPANY WEBFIL is a state based company under the Andrew Yule Group. Andrew Yule & Co. Ltd. a Government of India Enterprise is multi product, multi unit
Select Agent Program Workshop November 16, 2012. Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC)
Select Agent Program Workshop November 16, 2012 Agricultural Select Agent Program (USDA/APHIS) CDC Select Agent Program (HHS/CDC) Revisions to Regulations 11 (a) through 11 (c)(7): (b) and (c)(2) changed
SIMULATION BASED APPROACH TO STUDY THE INTERACTION OF SCHEDULING AND ROUTING ON A LOGISTIC NETWORK
SIMULATION BASED APPROACH TO STUDY THE INTERACTION OF SCHEDULING AND ROUTING ON A LOGISTIC NETWORK Alex J. Ruiz-Torres Department of Decision Sciences Florida Gulf Coast University 17595 S. Tamiami Trail,
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
Nuclear Plant Security Systems
Nuclear Plant Security Systems Course Description Gary W Castleberry, PE This course will introduce the student into the design of security systems for commercial nuclear power plants. An overview of plant
3.0 Nonsystem Based Design Descriptions and ITAAC
3.0 Nonsystem Based Design Descriptions and ITAAC 3.1 Security 3.1.1 Design Features The physical security system provides physical features to detect, delay, assist response to, and defend against the
Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation
Cloud Enabled Emergency Navigation Using Faster-than-real-time Simulation Huibo Bi and Erol Gelenbe Intelligent Systems and Networks Group Department of Electrical and Electronic Engineering Imperial College
Sam Docknevich, PSP, Security Service Portfolio Manager. Are You Prepared? The impending impact of Code on Servicing Security Systems
Sam Docknevich, PSP, Security Service Portfolio Manager Are You Prepared? The impending impact of Code on Servicing Security Systems usa.siemens.com/infrastructure-cities Share current and upcoming standards
Questions related to specific materials, methods, and services will be addressed at the conclusion of each presentation.
CEFPI is a Registered Provider with The American Institute of Architects Continuing Education Systems (AIA/CES). Credit(s) earned on completion of this program will be reported to AIA/CES for AIA members.
Proposal for a Virtual 3D World Map
Proposal for a Virtual 3D World Map Kostas Terzidis University of California at Los Angeles School of Arts and Architecture Los Angeles CA 90095-1467 ABSTRACT The development of a VRML scheme of a 3D world
Integrated Physical Security and Incident Management
IT Enterprise Services Integrated Physical Security and Incident Management Every organisation needs to be confident about its physical security and its ability to respond to unexpected incidents. Protecting
Process Intelligence: An Exciting New Frontier for Business Intelligence
February/2014 Process Intelligence: An Exciting New Frontier for Business Intelligence Claudia Imhoff, Ph.D. Sponsored by Altosoft, A Kofax Company Table of Contents Introduction... 1 Use Cases... 2 Business
Terrorist Protection Planning Using a Relative Risk Reduction Approach*
BNL-71383-2003-CP Terrorist Protection Planning Using a Relative Risk Reduction Approach* Session VIII: Technology Forum Focus Groups Dr. Joseph P. Indusi Nonproliferation and National Security Department
Intelligent Monitoring Software. IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432
Intelligent Monitoring Software IMZ-RS400 Series IMZ-RS401 IMZ-RS404 IMZ-RS409 IMZ-RS416 IMZ-RS432 IMZ-RS400 Series Reality High Frame Rate Audio Support Intelligence Usability Video Motion Filter Alarm
Global Supply Chain Security Recommendations
Global Supply Chain Security Recommendations These minimum security criteria are fundamentally designed to be the building blocks for foreign manufacturers to institute effective security practices designed
LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM. Your Connected Business
LYNX Touch Small Business Solutions DYNAMIC, FULL COLOR SELF-CONTAINED BUSINESS CONTROL SYSTEM Your Connected Business LYNX Touch Protected and Connected Honeywell s LYNX Touch self-contained business
Security-in-Depth 4/26/2013. Physical Security Webinar. DCO Meeting Room Navigation. Host: Danny Jennings
Security-in-Depth Physical Security Webinar Host: Danny Jennings Physical Security Curriculum Manager responsible for: Curriculum development Course instruction Curriculum review Retired military; over
securıty HOME home protection 101
securıty HOME home protection 101 Do I really need a security system? Yes, you do! There is always the risk of fire, theft, or home intrusion. Whether at home during the day, asleep at night, or away,
HSR HOCHSCHULE FÜR TECHNIK RA PPERSW I L
1 An Introduction into Modelling and Simulation 4. A Series of Labs to Learn Simio af&e Prof. Dr.-Ing. Andreas Rinkel [email protected] Tel.: +41 (0) 55 2224928 Mobil: +41 (0) 79 3320562 Lab 1 Lab
"DOT IN-DEPTH HAZMAT SECURITY TRAINING"
PRESENTER'S GUIDE "DOT IN-DEPTH HAZMAT SECURITY TRAINING" For the Department of Transportation's 49 CFR 172.700 Subpart H Training Requirements Quality Safety and Health Products, for Today...and Tomorrow
Risk Management Handbook
Risk Management Handbook 1999 Introduction Risk management is the process of selecting and implementing countermeasures to achieve an acceptable level of risk at an acceptable cost. The analytical risk
Does function point analysis change with new approaches to software development? January 2013
Does function point analysis change with new approaches to software development? January 2013 Scope of this Report The information technology world is constantly changing with newer products, process models
Building Integration System Selection Guide for V4.0
Building Integration System Selection Guide for V.0 Building Integration System Contents Contents System overview... Typical applications... Connection types and licensing basics... 6 Selection Guide
WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM
BACKGROUND WAREHOUSE SECURITY BEST PRACTICE GUIDELINES CUSTOMS-TRADE PARTNERSHIP AGAINST TERRORISM In the aftermath of September 11, U.S. Customs and Border Protection (CBP) in cooperation with its trade
1. Perimeter fencing or walls should enclose the vicinity around cargo handling and loading areas, as well as storage facilities.
2. Physical Security Cargo handling and storage facilities in domestic and foreign locations must have physical barriers and deterrents that guard against unauthorized access. Where applicable, there must
Fully integrated perimeter alert system for simultaneous threat detection and assessment.
SECURITY FLIR Thermal Fence D e t e c t. A s s e s s. R e s p o n d. I n s t a n t l y. The FLIR Thermal Fence Fully integrated perimeter alert system for simultaneous threat detection and assessment.
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
Malay A. Dalal Madhav Erraguntla Perakath Benjamin. Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A.
AN INTRODUCTION TO USING PROSIM FOR BUSINESS PROCESS SIMULATION AND ANALYSIS Malay A. Dalal Madhav Erraguntla Perakath Benjamin Knowledge Based Systems, Inc. (KBSI) College Station, TX 77840, U.S.A. ABSTRACT
SITUATIONAL AWARENESS MITIGATE CYBERTHREATS
Gaining the SITUATIONAL AWARENESS needed to MITIGATE CYBERTHREATS Industry Perspective EXECUTIVE SUMMARY To become more resilient against cyberthreats, agencies must improve visibility and understand events
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Best Practices for Verification, Validation, and Test in Model- Based Design
2008-01-1469 Best Practices for Verification, Validation, and in Model- Based Design Copyright 2008 The MathWorks, Inc. Brett Murphy, Amory Wakefield, and Jon Friedman The MathWorks, Inc. ABSTRACT Model-Based
How To Manage A Security System
SANDIA REPORT SAND2008-81438143 Unclassified Unlimited Release Printed December 2008 Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures Calvin D. Jaeger,
Surveillance and Security Technologies for Bridges and Tunnels
Surveillance and Security Technologies for Bridges and Tunnels Sheila Rimal Duwadi, P.E., Team Leader Bridge Safety, Reliability and Security, Federal Highway Administration, 6300 Georgetown Pike, McLean
How To Ensure Security At A Site Security Site
Facility XXXX Site Security Survey Date: 10/9-10/10/02 (A) Perimeter Security DELAY/DETER Site Boundary None of the critical facilities have protective Fence (Height and Construction) fences. Outriggers
Video Analytics and Security
Video Analytics and Security Using video data to improve both safety and ROI March 2008 / White Paper Make the most of your energy Summary I. Executive Summary... 3 II. Captured on Video. Now What?...
KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS. Henk de Swaan Arons
KNOWLEDGE-BASED MODELING OF DISCRETE-EVENT SIMULATION SYSTEMS Henk de Swaan Arons Erasmus University Rotterdam Faculty of Economics, ment of Computer Science P.O. Box 1738, H9-28 3000 DR Rotterdam, The
Security Tools. Forms. Physical Security Assessment Security Plan Template Traffic Control Plan Template
Security Tools Forms Physical Security Assessment Security Plan Template Traffic Control Plan Template 1 Physical Security Assessment (PSA) Date: I. PHYSICAL SECURITY ASSESSMENT (PSA): EXTERIOR OF THE
Intermec Security Letter of Agreement
Intermec Security Letter of Agreement Dear Supplier, Please be advised that Intermec Technologies has joined US Customs and Border Protection (USC&BP) in the Customs-Trade Partnership Against Terrorism
securıty HOME home protection 101
securıty HOME home protection 101 Do I really need a security system? Yes, you do! There is always the sonal electronic sentry, able to see and risk of fire, theft, or home intrusion. hear trouble. It
Qualitative Approach to Evaluation of Critical Infrastructure Security Systems
Qualitative Approach to Evaluation of Critical Infrastructure Security Systems Tomáš Loveček University of Žilina [email protected] Juraj Vaculík University of Žilina [email protected]
COMITÉ EUROPÉEN DES ASSURANCES
COMITÉ EUROPÉEN DES ASSURANCES SECRETARIAT GENERAL 3bis, rue de la Chaussée d'antin F 75009 Paris Tél. : +33 1 44 83 11 73 Fax : +33 1 44 83 11 85 Web : cea.assur.org DELEGATION A BRUXELLES Square de Meeûs,
Security Technology. Virtual
Virtual Security Technology Complete Security Solutions for Communities Secure your Entire Community with an Envera Integrated System We were concerned residents would feel they weren t receiving the same
Finding the KPIs for Yard Management
Finding the KPIs for Yard Management 2 EXECUTIVE SUMMARY Yard management is a critical linkage in logistics management practices, and has a significant impact on the overall efficiency of the supply chain.
Case Study: Real-Time Video Quality Monitoring Explored
1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Case Study: Real-Time Video Quality Monitoring Explored Bill Reckwerdt, CTO Video Clarity, Inc. Version 1.0 A Video Clarity Case
Motorola AirDefense Network Assurance Solution. Improve WLAN reliability and reduce management cost
Motorola AirDefense Network Assurance Solution Improve WLAN reliability and reduce management cost The challenge: Ensuring wireless network performance and availability Wireless LANs help organizations
ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION
ACFA INTELLECT: COMPREHENSIVE SOLUTION FOR SECURITY INTEGRATION Reliable protection of facilities and intellectual property Intrusion prevention Workplace time and attendance Streamlining of staff needs
INTRODUCTION TO MANUFACTURING EXECUTION SYSTEMS MES CONFERENCE & EXPOSITION. Baltimore, Maryland
INTRODUCTION TO MANUFACTURING EXECUTION SYSTEMS MES CONFERENCE & EXPOSITION JUNE 4-6, 2001 Baltimore, Maryland Michael McClellan President MES Solutions Incorporated Terrebonne, Oregon 97760 541 548 6690
Product Characteristics Page 2. Management & Administration Page 2. Real-Time Detections & Alerts Page 4. Video Search Page 6
Data Sheet savvi Version 5.3 savvi TM is a unified video analytics software solution that offers a wide variety of analytics functionalities through a single, easy to use platform that integrates with
G4S NSSC A Global Pioneer in Providing High Level Security Systems, Consulting, Engineering and Testing for Critical Infrastructure
G4S NSSC A Global Pioneer in Providing High Level Security Systems, Consulting, Engineering and Testing for Critical Infrastructure The Most Qualified Professionals in the Security Industry Since 1986,
CHAPTER 1. Introduction to CAD/CAM/CAE Systems
CHAPTER 1 1.1 OVERVIEW Introduction to CAD/CAM/CAE Systems Today s industries cannot survive worldwide competition unless they introduce new products with better quality (quality, Q), at lower cost (cost,
How can we prevent security breaches?
How can we prevent security breaches? Unify your security management with Siveillance Vantage to enhance the emergency and routine procedures of your critical infrastructure. Answers for infrastructure.
How To Protect A Water System
SECURITY OFFICER & PATROL OFFICER PROTOCOL SECURITY OFFICER LOCATIONS AND SHIFTS La Entrada Main Security Center 24 hour coverage 7 days per week Plant 1 Main Gate Monday Friday, 5:00 AM 6:00 PM Patrol
Physical Security. Paul Troncone CS 996
Physical Security Paul Troncone CS 996 NSTISSI 4011 Building Construction Alarms Access Controls Information Systems Centers Personnel Security Tamper Resistance Goals of Physical Security Safeguard personnel
SureSense Software Suite Overview
SureSense Software Overview Eliminate Failures, Increase Reliability and Safety, Reduce Costs and Predict Remaining Useful Life for Critical Assets Using SureSense and Health Monitoring Software What SureSense
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
View. Select View Managed Video Services ADT
monitoring Access Control Video Surveillance Intrusion Detection Fire & life safety Commercial Solutions ADT SM Select View Managed Video Services Leverage your existing investment in video surveillance
Cognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory [email protected], [email protected] The cognitive and organizational
HIGHLY SOPHISTICATED MONITORING
PERFECTLY PROTECTED HIGHLY SOPHISTICATED MONITORING Yachts are masterpieces of design and technology with thousands of functions providing the highest level of comfort. Besecke s automation and circuitry
How To Create An Intelligent Infrastructure Solution
SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure
Remote Monitoring offers a comprehensive range of services, which are continually
Remote Monitoring Since the early 1990 s commercial remote monitoring has provided security solutions across a broad spectrum of industries. As the threat of crime and the cost of manned guarding have
