A Comparison of Laboratory and Vulnerability Evaluation Methods for the Testing Security Equipment

نویسندگان

  • Benjamin Beard
  • David J. Brooks
چکیده

A facility wide security system cannot be tested without causing disruption or creating vulnerabilities within the system. To overcome this issue, individual components or equipment may be evaluated to a priori performance standard. The two common approaches to security equipment evaluations are vulnerability attacks and laboratory testing. Laboratory testing of security equipment can reduce the costs and time associated with evaluations, as well as limiting the subjectivity of the tests. Vulnerability attacks will produce more realistic evaluation results of the whole security system; nevertheless, the data obtained is dependent on the physical attributes and skill of the attackers. This study ascertained what methodology, namely laboratory testing or vulnerability testing, was the most effective. To achieve this, both testing methodologies were applied to security padlocks with expert validation. The study confirmed that if security equipment has been laboratory tested to a designed priori performance level, the degree of security vulnerability can be effectively identified. As the security padlocks demonstrated, the high level achieved in the laboratory tests correlated with a high delay factor in vulnerability testing. Such an approach to security equipment testing resulted in a reliable and valid quantitative data set that could be applied at a later stage to other similar equipment. Nevertheless, it is suggested that when considering a facility wide security system, some degree of both laboratory and vulnerability testing has to be applied as they are complimentary.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

Security testing of session initiation protocol implementations

The mechanisms which enable the vast majority of computer attacks are based on design and programming errors in networked applications. The growing use of voice over IP (VOIP) phone technology makes these phone applications potential targets. We present a tool to perform security testing of VOIP applications to identify security vulnerabilities which can be exploited by an attacker. Session Ini...

متن کامل

Efficiency Evaluation of Medical Diagnostic Laboratories Using Data Envelopment Analysis in Isfahan, Iran

Abstract Background and Objective: Multi-criteria comparison between laboratories is important for laboratory management to improve performance and for policymakers to make strategic decisions. In this study, those aspects of performance are considered that are beyond the traditional evaluation carried out by checklist. Material and Methods: After the identifying the effective m...

متن کامل

Comparison of noninvasive prenatal testing of cell‐free DNA in maternal blood and amniocentesis for evaluation of aneuploidy

Background: The aim of this study was to compare noninvasive prenatal testing (NIPT) of cell‐free DNA in maternal blood and amniocentesis in the diagnosis of aneuploidy. This study was designed to evaluate sensitivity, specificity, accuracy, positive predictive value and negative predictive value of NIPT for detection of aneuploidies compared gold standard test of amniocentesis. Materials and m...

متن کامل

Evaluation of Water Resources Exploitation in a Karst Region Using Intrinsic Vulnerability Assessment

Groundwater vulnerability assessment is of crucial importance for land use/cover management. Some methods have been proposed specifically for the karst hydrogeological settings. Among them, COP and PaPRIKa, as two commonly applied recent methods, were adopted for the resource vulnerability assessment of a humid temperate karst region, north of Iran. Comparison of water bacterial content and dis...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010