首页> 美国政府科技报告 >Technical approach for determining the importance of information in computerized alarm systems
【24h】

Technical approach for determining the importance of information in computerized alarm systems

机译:确定计算机警报系统中信息重要性的技术方法

获取原文

摘要

Computerized alarm and access control systems must be treated as special entities rather than as generic automated information systems. This distinction arises due to the real-time control and monitoring functions performed by these systems at classified facilities and the degree of centralization of a site's safeguards system information in the associated databases. As an added requirement for these systems, DOE safeguards and security classification policy is to protect information whose dissemination has the potential for significantly increasing the probability of successful adversary action against the facility, or lowering adversary resources needed for a successful attack. Thus at issue is just how valuable would specific alarm system information be to an adversary with a higher order objective. We have developed and applied a technical approach for determining the importance of information contained in computerized alarm and access control systems. The methodology is based on vulnerability assessment rather than blanket classification rules. This method uses a system architecture diagram to guide the analysis and to develop adversary defeat methods for each node and link. These defeat methods are evaluated with respect to required adversary resources, technical difficulty, and detection capability. Then they are incorporated into site vulnerability assessments to determine the significance of alarm system information in the context of a facility attack. This methodology was successfully applied to the Argus alarm, access control, and assessment system developed at the Lawrence Livermore National Lab. Argus is software-driven, contains interrelated databases, shares host computers, and communicates with field processors and alarms through a common network. The evaluation results provided insights into the importance of alarm system information while the methodology itself provided a framework for addressing associated information protection issues.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号