98 research outputs found
Risk Assessment Techniques for Civil Aviation Security
Following the 9/11 terrorists attacks a strong economical effort was made to improve and adapt aviation security, both in infrastructures as in airplanes. National and international guidelines were promptly developed with the objective of creating a security management system able to supervise the identification of risks and the definition and optimisation of control measures. Risk assessment techniques are thus crucial in the above process, since an incorrect risk identification and quantification can strongly affect both the security level as the investments needed to reach it. The paper proposes a set of methodologies to qualitatively and quantitatively assess the risk in the security of civil aviation and the risk assessment process based on the threats, criticality and vulnerabilities concepts, highlighting their correlation in determining the level of risk. RAMS techniques are applied to the airport security system in order to analyse the protection equipment for critical facilities located in air-side, allowing also the estimation of the importance of the security improving measures vs. their effectiveness
Recommended from our members
Wired warfare 3.0: protecting the civilian population during cyber operations
As a general matter, international humanitarian law is up to the task of providing the legal framework for cyber operations during an armed conflict. However, two debates persist in this regard, the resolution of which will determine the precise degree of protection the civilian population will enjoy during cyber operations. The first revolves around the meaning of the term “attack” in various conduct of hostilities rules, while the second addresses the issue of whether data may be considered an object such that operations destroying or altering it are subject to the prohibition on attacking civilian objects and that such effects need be considered when considering proportionality and the taking of precautions in attack. Even if these debates were to be resolved, the civilian population would still face risks from the unique capabilities of cyber operations. This article proposes two policies which parties to a conflict should consider adopting in order to ameliorate such risks. They are both based on the premise that military operations must reflect a balance between military concerns and the interest of States in prevailing in the conflict
Shields Up For Software
This Article contends that the National Cybersecurity Strategy\u27s software liability regime should incorporate two safe harbors. The first would shield software creators and vendors from liability for decisions related to design, implementation, and maintenance, as long as those choices follow enumerated best practices. The second—the “inverse safe harbor”—would have the opposite effect: coders and distributors who engaged in defined worst practices would automatically become liable. This Article explains the design, components, and justifications for these twin safe harbors. The software safe harbors are key parts of the overall design of the new liability regime and work in tandem with the standard of care proposed in the National Cybersecurity Strategy. The safe harbors’ role is to provide certainty to regulated entities; to reduce the administrative costs of the new regime; and to create incentives for adopting best practices or avoiding worst ones
Recommended from our members
Critical Infrastructure Security: CRS Experts
This report contains a table which provides access to names and contact information for CRS experts on policy concerns relating to critical infrastructure security. Policy areas identified include: mission; security services; and specific sectors: assessing vulnerabilities, planning and implementation
Recommended from our members
Critical Infrastructure and Key Assets: Definition and Identification
This report reviews the concept and definition of “critical infrastructure” as it has appeared in federal reports, legislation and regulation since the early 1980s. The report highlights the changes and expansion of that definition as the focus of public policy debates shifted from infrastructure adequacy to infrastructure protection. Finally the report summarizes current policy issues associated with critical infrastructure identification by federal agencies and the private sector. The report is intentionally limited to definitional issues and categorization of infrastructure
Recommended from our members
Critical Infrastructure: The National Asset Database
The purpose of this report is to discuss the National Asset Database: what is in it, how it is populated, what the Database apparently is, what it is not, and how it is intended to be used. The report also discusses some of the issues on which Congress could focus its oversight, including appropriation bill language
Research on radiation detectors, boiling transients, and organic lubricants
The accomplishments of a space projects research facility are presented. The subjects discussed are: (1) a study of radiation resistant semiconductor devices, (2) synthesis of high temperature organic lubricants, (3) departure from phase equilibrium during boiling transients, (4) effects of neutron irradiation on defect state in tungsten, and (5) determination of photon response function of NE-213 liquid scintillation detectors
Recommended from our members
Data Security: Federal and State Laws
Security breaches involving electronic personal data have come to light largely as a result of the California Security Breach Notification Act, a California notification law that went into effect in 2003. In response, the states and some Members have introduced bills that would require companies to notify persons affected by such security breaches. By December 2005, 35 states had introduced data security legislation and 22 states had enacted data security laws
Temperature and Strain-Rate Effects on Low-Cycle Fatigue Behavior of Alloy 800H
The effects of strain rate (4 x 10(exp -6) to 4 x 10(exp -3)/s) and temperature on the Low-Cycle Fatigue (LCF) behavior of alloy 800H have been evaluated in the range 750 C to 950 C. Total axial strain controlled LCF tests were conducted in air at a strain amplitude of +/- 0.30 pct. LCF life decreased with decreasing strain rate and increasing temperature. The cyclic stress response behavior showed a marked variation with temperature and strain rate. The time- and temperature- dependent processes which influence the cyclic stress response and life have been identified and their relative importance assessed. Dynamic strain aging, time-dependent deformation, precipitation of parallel platelets of M(23)C6 on grain boundaries and incoherent ledges of twins, and oxidation were found to operate depending on the test conditions. The largest effect on life was shown by oxidation processes
- …