DocumentCode :
1628087
Title :
Threat characterization in vital area identification process
Author :
Malachova, Tereza ; Malach, Jindrich ; Vintr, Zdenek
Author_Institution :
EBIS, spol. s r.o., Brno, Czech Republic
fYear :
2013
Firstpage :
1
Lastpage :
6
Abstract :
The identification of a potential attacker´s targets is fundamental in the design of a physical protection system for complex technological facilities such as nuclear facilities. An attack can be carried out to sabotage, or gain control of, targets that are physically represented by different parts of systems, structures and components (SSC), or their combination. Those SSCs that need to be protected in order to prevent radiological consequences in a nuclear facility are called vital and are located within vital areas. The use of attack trees in the vital area identification is an innovative approach that enables modeling of both the SSCs and the threat including their mutual interaction. Threat characteristics are described by a well-designed and scaled set of attributes. Required attacker´s capabilities to disable each SSC have to be assessed. Methods of expert opinion elicitation are mostly used for the assessment of attacker´s abilities to perform malevolent events on an individual SSC represented by tree leaf nodes. This paper presents the selected findings from the attack tree implementation in the vital area identification focusing on threat and supplementary attributes for the attack tree model. The protection tree is used to evaluate and identify vital area candidates. The suggested method of threat characterization in an attack tree enables time-effective, more precise and well-documented vital area identification.
Keywords :
security of data; trees (mathematics); attack tree model; attack trees; expert opinion elicitation method; nuclear facility; physical protection system; protection tree; radiological consequence; technological facility; threat characterization; tree leaf nodes; vital area identification process; Cooling; Fault trees; Fuels; Logic gates; Object recognition; Safety; Security; Attack Tree; Physical Protection System; Threat Characterization; Vital Area Identification;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology (ICCST), 2013 47th International Carnahan Conference on
Conference_Location :
Medellin
Type :
conf
DOI :
10.1109/CCST.2013.6922050
Filename :
6922050
Link To Document :
بازگشت