Proceedings ArticleDOI
Security simulation for vulnerability assessment
Brian Hennessey,Bradley Norman,Robert B. Wesson +2 more
- Vol. 6227, pp 622708
Reads0
Chats0
TLDR
Simulation technologies developed to "stimulate" an operational command and control security system are discussed, drawing parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing.Abstract:
This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, CONOPS development and operator training. The paper discusses the specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modeling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using Air Traffic Control simulators for operator training, incident recreation, procedure development and pre acquisition planning and testing.read more
Citations
More filters
Methods and Techniques for Enhancing Physical Security of Critical Infrastructures
TL;DR: The original contribution of this thesis is to provide methods for enhancing effectiveness and reliability of integrated security systems in order to guarantee an adequate protection level.
References
More filters
Methods and Techniques for Enhancing Physical Security of Critical Infrastructures
TL;DR: The original contribution of this thesis is to provide methods for enhancing effectiveness and reliability of integrated security systems in order to guarantee an adequate protection level.