scholarly journals Representing Uncertainty in Physical Security Risk Assessment

Author(s):  
Daniel Lichte ◽  
Dustin Witte ◽  
Thomas Termin ◽  
Kai-Dietrich Wolf

AbstractThe importance of (physical) security is increasingly acknowledged by society and the scientific community. In light of increasing terrorist threat levels, numerous security assessments of critical infrastructures are conducted in practice and researchers propose new approaches continuously. While practical security risk assessments (SRA) use mostly qualitative methods, most of the lately proposed approaches are based on quantitative metrics. Due to little evidence of actual attacks, both qualitative and quantitative approaches suffer from the fundamental problem of inherent uncertainties regarding threats and capabilities of security measures as a result from vague data or the usage of expert knowledge. In quantitative analysis, such uncertainties may be represented by, e.g., probability distributions to reflect the knowledge on security measure performance available. This paper focuses on the impact of these uncertainties in security assessment and their consideration in system design. We show this influence by comparing the results of a scalar evaluation that does not take into account uncertainties and another evaluation based on distributed input values. In addition, we show that the influence is concentrated on certain barriers of the security system. Specifically, we discuss the robustness of the system by conducting quantitative vulnerability assessment as part of the SRA process of an airport structure example. Based on these results, we propose the concept of a security margin. This concept accounts for the uncertain knowledge of the input parameters in the design of the security system and minimizes the influence of these uncertainties on the actual system performance. We show how this approach can be used for vulnerability assessment by applying it to the initially assessed configuration of the airport structure. The results of this case study support our assumptions that the security margin can help in targeted uncertainty consideration leading to reduced system vulnerability.

2010 ◽  
Vol 108-111 ◽  
pp. 948-953 ◽  
Author(s):  
Hao Yuan

Based on the research of domestic and foreign vulnerability assessment systems, in this paper, we propose an improved network security assessment method based on Immunity algorithm. It integrates the advantages of both host based and network based scan system. Our goal is to explore the known security vulnerabilities, and to check hosts’ security effectively as well. It has the features of self-adaptive, distributed, and real time. Therefore, it provides a good solution to risk assessment for network security.


2020 ◽  
Author(s):  
Pedro Rau ◽  
Wouter Buytaert ◽  
Fabian Drenkhan ◽  
Waldo Lavado ◽  
Juan Jimenez ◽  
...  

<p>The Peruvian Andes are a hotspot of vulnerabilities to impacts in water resources due to the propensity for water stress, the highly unpredictable weather, the sensitivity of glaciers, and the socio-economic vulnerability of its population. In this context, we selected the Vilcanota-Urubamba catchment in Southern Peru for addressing these challenges aiming at our objectives within a particular hydrological high-mountain context in the tropical Andes: a) Develop a fully-distributed, physically-based glacier surface energy balance model that allows for a realistic representation of glacier dynamics in glacier melt projections; b) Design and implement a glacio-hydrological monitoring and data collection approach to quantify non-glacial contributions to water resources and the impact of catchments interventions; c) Mapping of human water use at high spatiotemporal resolution and determining current and future levels of water (in)security; and d) Integrate last objectives in a glacier - water security assessment model and evaluate the tool's capacity to support locally embedded climate change adaptation strategies. </p><p>The RAHU project intends to transform the scientific understanding of the impact of glacier shrinkage on water security and, at the same time, to connect to and inform policy practices in Peru. It follows a "source to tap" paradigm, in which is planned to deliver a comprehensive and fully integrated water resources vulnerability assessment framework for glacier-fed basins, comprising state-of-the-art glaciology, hydrology, water demand characterisation, and water security assessment. It includes glacio-hydrological and water resources monitoring campaigns, to complement existing monitoring efforts of our project partners and collaborators, and new remotely sensed data sets. Those campaigns will be implemented using the principles and tools of participatory monitoring and knowledge co-creation that our team has pioneered in the tropical Andes. The datasets produced by this approach, combined with existing monitoring implemented by our team and collaborators, will allow us to build an integrated water supply-demand-vulnerability assessment model for glacierized basins, and to use this to evaluate adaptation strategies at the local scale. </p><p>This research is part of the multidisciplinary collaboration between British and Peruvian scientists (Newton Fund, Newton-Paulet).</p>


2018 ◽  
Vol 2 (4-2) ◽  
pp. 360
Author(s):  
Deni Satria ◽  
Alde Alanda ◽  
Aldo Erianda ◽  
Deddy Prayama

The development of information technology is a new challenge for computer network security systems and the information contained in it, the level of awareness of the importance of network security systems is still very low. according to a survey conducted by Symantec, the desire to renew an existing security system within a year within a company has the result that only 13% of respondents consider changes to the security system to be important from a total of 3,300 companies worldwide as respondents. This lack of awareness results in the emergence of security holes that can be used by crackers to enter and disrupt the stability of the system. Every year cyber attacks increase significantly, so that every year there is a need to improve the security of the existing system. Based on that, a method is needed to periodically assess system and network security by using penetrarion testing methods to obtain any vulnerabilities that exist on the network and on a system so as to increase security and minimize theft or loss of important data. Testing is carried out by using internal network penetration testing method which tests using 5 types of attacks. From the results of the tests, each system has a security risk of 20-80%. From the results of these tests it can be concluded that each system has a security vulnerability that can be attacked.


2009 ◽  
Vol 46 (02) ◽  
pp. 61-7
Author(s):  
S. T. Ung ◽  
V. Williams ◽  
S. Bonsall ◽  
J. Wang

A security assessment is considered to be a difficult mission because of the characteristically unpredictable outcomes associated with high consequences. This study offers an illustration using different approaches both in thinking about and in dealing with this issue. The security risk can be modeled and a risk ranking can be obtained based on the concept of "Failure Mode, Effects, and Criticality Analysis" (FMECA) using a fuzzy rule base method. The model presented in this study is based on the assumption that the elements of criticality at each port facility, and of the vulnerability of the security measures associated, are more important than the elements of probability of occurrence the threat associated and also of its severity. This is because the former two elements are the only factors that can be fully under control by the port authority. The priority of the order in implementing the modified security measures proposed to enhance the security level of each scenario is determined using "Expanded Failure Mode and Effects Analysis" (EFMEA), taking into account their feasibility and effect.


2014 ◽  
Vol 513-517 ◽  
pp. 1684-1687
Author(s):  
Ji Wen Huang ◽  
Zhi Long Deng

Based on system analysis of information security risk factors and evaluation process, aiming at the uncertainty information is difficult to quantify the evaluation process, Bayesian network inference algorithm, and combined with the inference rules of conditional probability matrix is given by expert knowledge of Bayesian network, the evaluation model of information security risk. Finally an instance of the risk assessment approach on the model is analyzed which demonstrates the rationality and feasibility of this method. So it provides a new method for information security assessment.


Author(s):  
Stefan Tibuleac

This article analyzes the most current security issues for the Republic of Moldova that are part of the regional security context of Eastern Europe –the region that can be considered the epicenter of international tensions through which the„geopolitical line of fracture”passes. The geographical position of the Republic of Moldova makes this state particularly sensitive to any negative trends in theregion. Growing of international tensions creates security threats and complicates economic development. From a historical point of view, Moldova has repeatedly fallen victim by the confrontation of the great powers. Therefore, the Republic of Moldova has a vital interest in preventing a new conflict in Eastern Europe. This article is based on a number of assumptions made by changes in the European security environment, such as the „shift of weight” to the East, strategic uncertainty, increasing the role of non-state actors, the situation in eastern Ukraine, etc. Based on these assumptions, this article makes an attempt to outline the potential role of the Republic of Moldova in the Eastern European security system, taking into account the desideratum for integration of the republic into the European Union. Other relevant factors will be taken into account for shaping the role of the Republic of Moldova in the European security system, namely: the security deficit; the impact of NATO and EU security policy; the rebirth of the project to create a regional defense alliance, etc. This article will largely take into account the military aspects of security. Keywords: Republic of Moldova, national security, Eastern Europe, NATO, Intermarium, defence, threats, risks, challenges


2020 ◽  
Vol 1 (11) ◽  
pp. 133-140
Author(s):  
E. V. DMITRIEVA ◽  

The article considers topical issues of economic support for the development of the regional security system of the population against various risks. The dependence of the impact of the scale of crisis situations on economic activities in the constituent entities of the Russian Federation, which become a serious barrier to the sustainable development of the regions of the country, was investigated. The increasing importance of risks of economic losses from accidents and disasters at potentially dangerous facilities as a result of the complex influence of natural, manmade and fire factors has been established. An analysis was carried out and proposals were developed to implement the key tasks of the state in the field of ensuring the protection of the population and territories of the country from disasters in order to ensure the stability of the economy. The organizational structure, division of tasks and functions between officials, crisis management structures and responding units were analyzed, taking into account the reduction in current financial costs. On the basis of a study of the peculiarities of the regions of the country, recommendations were formed to fulfill the necessary tasks by the anti-crisis management bodies in the field of reducing economic damage on the basis of preventing crisis situations and ensuring fire safety. It is proposed to organize the practical application of a complex automated security system based on modern developments with the application of improving the qualities and efficiency of anti-crisis management processes in order to increase economic efficiency. Initial data were formed to reduce potential threats of a natural, man-made, fire and other nature in the regions using financial and economic mechanisms. It is proposed to implement a set of priority measures to further improve and increase the potential of economic support for the anti-crisis management system. The materials of the article can be used in planning the main directions of the development of the regional population security system and the implementation of socio-economic development programs.


2020 ◽  
Vol 4 (4) ◽  
pp. 281-290
Author(s):  
Tingzhu Chen ◽  
Yaoyao Qian ◽  
Jingyu Pei ◽  
Shaoteng Wu ◽  
Jiang Wu ◽  
...  

Oracle bone script recognition (OBSR) has been a fundamental problem in research on oracle bone scripts for decades. Despite being intensively studied, existing OBSR methods are still subject to limitations regarding recognition accuracy, speed and robustness. Furthermore, the dependency of these methods on expert knowledge hinders the adoption of OBSR systems by the general public and also discourages social outreach of research outputs. Addressing these issues, this study proposes an encoding-based OBSR system that applies image pre-processing techniques to encode oracle images into small matrices and recognize oracle characters in the encoding space. We tested our methods on a collection of oracle bones from the Yin Ruins in XiaoTun village, and achieved a high accuracy rate of 99% within a time range of milliseconds.


2021 ◽  
Vol 13 (11) ◽  
pp. 6503
Author(s):  
Yu Peng ◽  
Hubert Hirwa ◽  
Qiuying Zhang ◽  
Guoqin Wang ◽  
Fadong Li

Given the impact of COVID-19 and the desert locust plague, the Ethiopian food security issue has once again received widespread attention. Its food crisis requires comprehensive and systematic research to achieve the United Nations Sustainable Development Goal of zero hunger. This review discusses the current situation and the causes of food security in Ethiopia. We focus on the challenges in the food security assessment field. The article lists seven typical causes of food insecurity and three roots of food security in Ethiopia. Long-term food security assessment and a comprehensive understanding and manageability for food security causes are considered as the main existing research challenges. Climate-resilient management, water management, and long-term ecosystem network monitoring and data mining are suggested as potential roadmap for future research.


Volume 3 ◽  
2004 ◽  
Author(s):  
Hua Dong ◽  
P. John Clarkson ◽  
Simeon Keates

In the past twenty years, a number of resources and tools to support inclusive design have been developed. However, the impact of these resources and tools on industry is not evident — few industrialists have been using them in practice. Investigations into industry have identified unmet needs, for example, the lack of appropriate user data relating to inclusive design. The fundamental problem is that few resources and tools have been developed based on rigorous requirements capture. In fact, many of them were developed only because the developers think the information could be useful. It is essential to prepare a detailed requirements list when clarifying the task at the product planning stage. This is also true for developing resources and tools for inclusive design. Requirements capture plays an important role in identifying real needs from users and developing appropriate methods of support for them. This paper starts with a survey of available resources and tools for inclusive design, and a discussion on their merits and deficiencies in respect to industry application. A number of methods are employed for the requirements capture for an inclusive design toolkit, which leads to a consistent result. An outline of the toolkit is also presented.


Sign in / Sign up

Export Citation Format

Share Document