scispace - formally typeset
Proceedings ArticleDOI

Security simulation for vulnerability assessment

Reads0
Chats0
TLDR
Simulation technologies developed to "stimulate" an operational command and control security system are discussed, drawing parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing.
Abstract
This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, CONOPS development and operator training. The paper discusses the specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modeling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using Air Traffic Control simulators for operator training, incident recreation, procedure development and pre acquisition planning and testing.

read more

Citations
More filters

Methods and Techniques for Enhancing Physical Security of Critical Infrastructures

TL;DR: The original contribution of this thesis is to provide methods for enhancing effectiveness and reliability of integrated security systems in order to guarantee an adequate protection level.
References
More filters

Methods and Techniques for Enhancing Physical Security of Critical Infrastructures

TL;DR: The original contribution of this thesis is to provide methods for enhancing effectiveness and reliability of integrated security systems in order to guarantee an adequate protection level.