首页> 美国政府科技报告 >Comprehensive method for evaluating safeguards against the insider threat. The Insider Evaluation module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security).
【24h】

Comprehensive method for evaluating safeguards against the insider threat. The Insider Evaluation module of ASSESS (Analytic System and Software for Evaluating Safeguards and Security).

机译:评估内部威胁防范措施的综合方法。 assEss的内幕评估模块(用于评估保障和安全的分析系统和软件)。

获取原文

摘要

We are developing a comprehensive tool for evaluating the effectiveness of safeguards and security systems against theft of special nuclear material by insiders. This tool, the Insider Evaluation module, is an integral part of ASSESS (Analytic System and Software for Evaluating Safeguards and Security) which is being developed jointly by Lawrence Livermore and Sandia National Laboratories. The Insider Evaluation module provides the user with a systematic, easy to use tool and an extensive database for analyzing the insider threat. This paper focuses on demonstrating the software, describing its input requirements and the various output options available to the user. An evaluation using this tool begins by defining the types of potential insider adversaries and specifying their levels of access and types of authority at the facility, as well as any procedures that may affect those theft strategies that take place across multiple facility layers. Users input to the module is facilitated by predefined databases of options from which the user can select those appropriate to their facility. The module identifies the optimal theft scenario and computes the corresponding probability of detection for each potential adversary type. Results are displayed in tables or graphs at varying levels of detail. For example, summary results present the overall probability of detection for each adversary. However, the user can focus, or ''zoom,'' on a particular result to gain further insights about the particular strategies or methods used by the adversaries. The most detailed results specify the best method an adversary could use to defeat each safeguards component at a path element to accomplish a particular strategy. Use of the predefined database of strategies and probabilities helps create consistent results and helps document the modeling assumptions used. 6 refs., 9 figs.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号