首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Adversarial safety analysis: borrowing the methods of security vulnerability assessments
Authors:Johnston Roger G
Institution:Vulnerability Assessment Team, Los Alamos National Laboratory, MS J565, Los Alamos, NM 87545, USA
Abstract:INTRODUCTION: Safety and security share numerous attributes. The author, who heads the (Security) Vulnerability Assessment Team at Los Alamos National Laboratory, therefore argues that techniques used to optimize security might be useful for optimizing safety. OPTIMIZING SECURITY: There are three main ways to attempt to improve security-security surveys, risk assessment (or "design basis threat"), and vulnerability assessments. The latter is usually the most effective. SAFETY ANALOGS: Vulnerability assessment techniques used to improve security can be applied to safety analysis--even though safety is not ordinarily viewed as having malicious adversaries (other than hazards involving deliberate sabotage). Thinking like a malicious adversary can nevertheless have benefits in identifying safety vulnerabilities. SUGGESTIONS: The attributes of an effective safety vulnerability assessment are discussed, and recommendations are offered for how such an adversarial assessment might work. CONCLUSION: A safety vulnerability assessment can potentially provide new insights, a fresh and vivid perspective on safety hazards, and increased safety awareness.
Keywords:Vulnerability assessment  Risk assessment  Security  Psychology of safety  Safety evaluations
本文献已被 ScienceDirect PubMed 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号