Assessing the Security Benefits of a Trusted Traveler Program in the Presence of Attempted Attacker Exploitation and Compromise
نویسندگان
چکیده
working paper series. RAND working papers are intended to share researchers' latest findings and to solicit informal peer review. They have been approved for circulation by RAND National Security Research Division but have not been formally peer reviewed. Unless otherwise indicated, working papers can be quoted and cited without permission of the author, provided the source is clearly referred to as a working paper. RAND's publications do not necessarily reflect the opinions of its research clients and sponsors. is a registered trademark. very significant changes have been made to aviation security in an effort to prevent future terrorist attacks. Additional screening processes have been put in place, new technologies have been deployed, and—as is reflected in the budgets for the aviation elements of the Transportation Security Administration—increased resources, now exceeding $6 billion dollars per year, have been committed to aviation security (Department of Homeland Security, 2011). As these changes have occurred, however, questions have been raised about the basic philosophy of aviation security, which is that security is applied uniformly to all. This argument has been crystallized in public debate with images of " grandmothers getting the same treatment as people who are more likely to be terrorists. " One outcome of this debate has been renewed interest in ways to vary the amount of screening individuals receive with the goals of improving performance and reducing the security burden on (some) travelers. Preferential treatment in screening can be approached in two ways. The first is identifying individuals who may pose more risk than others and allocating more security resources to them, a process usually called profiling. The second is identifying individuals who likely pose less risk than others and allowing them to pass through security with reduced security screening, a process known as trusted traveler programs. There is an extensive literature examining the former, 1 but there is much less analysis of the latter (see Government Accountability Office, 2002). Our focus here is on trusted traveler programs. The basic logic of a trusted traveler program is that security resources can be shifted from travelers who have been confirmed as low risk to the remaining unknown‐risk population. It is assumed that devoting more security resources to the unknown‐risk population would increase the chance of identifying individuals seeking to bring weapons through security checkpoints to stage attacks on aircraft. The key elements of a trusted traveler program are the following: 1. A …
منابع مشابه
A Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملA Distributed Authentication Model for an E-Health Network Using Blockchain
Introduction: One of the most important and challenging areas under the influence of information technology is the field of health. This pervasive influence has led to the development of electronic health (e-health) networks with a variety of services of different qualities. The issue of security management, maintaining confidentiality and data integrity, and exchanging it in a secure environme...
متن کاملAirport Security Versus Patient Security: The “Sickurity” Problem
The massive restrain security measurements at the airports very much impress the health status of the healthy and sick passengers alike. The security check is undisputedly a harassment – the confiscation of fluids, the limited movement on the airplane results in a stressful situation and put a harmful effect on healthy traveler and an even more harmful one on the sick. This kind of problem coul...
متن کاملIdentification and ranking of occupational and technical stress factors of information security in Aghajari oil and gas Exploitation Company
The purpose of this study is to identify and prioritize the effective technical and technical stress factors of information security by IT experts identified in Aghajari oil and gas Exploitation Company. The statistical population of the study consisted of 100 ICT managers and experts in Aghajari Oil and Gas Co. which directly related to the security of information in the company, 80 of them we...
متن کاملTime-to-Compromise Model for Cyber Risk Reduction Estimation
We propose a new model for estimating the time to compromise a system component that is visible to an attacker. The model provides an estimate of the expected value of the time-to-compromise as a function of known and visible vulnerabilities, and attacker skill level. The time-to-compromise random process model is a composite of three subprocesses associated with attacker actions aimed at the e...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2011