Adversarial safety analysis: borrowing the methods of security vulnerability assessments |
| |
Authors: | Johnston Roger G |
| |
Affiliation: | Vulnerability Assessment Team, Los Alamos National Laboratory, MS J565, Los Alamos, NM 87545, USA |
| |
Abstract: | INTRODUCTION: Safety and security share numerous attributes. The author, who heads the (Security) Vulnerability Assessment Team at Los Alamos National Laboratory, therefore argues that techniques used to optimize security might be useful for optimizing safety. OPTIMIZING SECURITY: There are three main ways to attempt to improve security-security surveys, risk assessment (or "design basis threat"), and vulnerability assessments. The latter is usually the most effective. SAFETY ANALOGS: Vulnerability assessment techniques used to improve security can be applied to safety analysis--even though safety is not ordinarily viewed as having malicious adversaries (other than hazards involving deliberate sabotage). Thinking like a malicious adversary can nevertheless have benefits in identifying safety vulnerabilities. SUGGESTIONS: The attributes of an effective safety vulnerability assessment are discussed, and recommendations are offered for how such an adversarial assessment might work. CONCLUSION: A safety vulnerability assessment can potentially provide new insights, a fresh and vivid perspective on safety hazards, and increased safety awareness. |
| |
Keywords: | Vulnerability assessment Risk assessment Security Psychology of safety Safety evaluations |
本文献已被 ScienceDirect PubMed 等数据库收录! |
|