DRAFT PLEASE DO NOT CITE WITHOUT PERMISSION Protecting Critical Nuclear Infrastructure: Strategies for Security

نویسنده

  • Edward Blandford
چکیده

The safety and security of a nuclear facility share a common objective – ensure the protection of the local population, society at large, and the environment. The gradual transition in reactor safety regulation from highly deterministic requirements toward a more riskinformed framework provides a useful analogue for reactor security and ensuring effective resource allocation. However, there are some important differences between the way security and safety risks are quantified and managed. A cornerstone of the National Strategy for Homeland Security and the National Infrastructure Protection Plan is that terrorists pose a strategic threat to key assets and critical infrastructure. Unlike hurricanes, tornadoes, earthquakes, or equipment failures, terrorists do not act randomly and instead try to strike where the defenses are weak and the expected gains are large. As a result, protecting one target may simply shift the risk of attack to another target. Failing to treat threats as fully strategic can lead to significant misallocations of defensive resources. The current Design Basis Threat (DBT) approach to allocating defensive resources generally requires the defender to attain a high probability of successfully defending against a specific threat or small number of specific threats and is typically highly prescriptive. This paper integrates fully strategic threats and elements of risk analysis by modeling the interaction between a defender and attacker as a game. Additionally, an alternative theoretical framework for characterizing and managing the risks posed by security threats is developed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Architecture Schema for Embodied Cognitive Systems

DRAFT: Please do not quote without permission; comments welcome.

متن کامل

Alternative Gmm Methods for Nonlinear Panel Data Models: Asymptotic Eeciency versus Small Sample Performance

Preliminary draft, comments welcome (Please do not quote or circulate without permission of the authors)

متن کامل

Working Paper Series in Finance 99/01 THEORY AND EVIDENCE ON THE RELATIONSHIP BETWEEN OWNERSHIP STRUCTURE AND CAPITAL STRUCTURE

The working paper series is for manuscripts in draft form. Comments are welcome and should be sent to the contact author. Please do not quote without permission.

متن کامل

Quigley, Kevin and Burns, Calvin and Stallard, Kristen (2015) 'Cyber gurus' : a rhetorical analysis of the language of cybersecurity specialists and the implications for security policy and critical infrastructure

Strathprints is designed to allow users to access the research output of the University of Strathclyde. Unless otherwise explicitly stated on the manuscript, Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. Please check the manuscript for details of any other licences that may have been applied. You may not engage in ...

متن کامل

Convexity and Topology on Measure Spaces

This draft will develop in notes for the Minerva lectures given at Columbia University by the author in October of 2015. At this point, the text is very incomplete and may contain substantial mistakes and inconsistencies. Please do not distribute without permission of the author, and contact via email at [email protected] to report and errors you may have discovered.

متن کامل

Are We Compromised? Modelling Security Assessment Games

Security assessments are an integral part of organisations’ strategies for protecting their digital assets and critical IT infrastructure. In this paper we propose a game-theoretic modelling of a particular form of security assessment – one which addresses the question “are we compromised?”. We do so by extending the recently proposed game “FlipIt”, which itself can be used to model the interac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010