Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Threat scenarios

It is worth noting that blast capacity of a polycarbonate pane is sensitive to the duration of the blast load. Because of this, the typical short overpressure duration testing of polycarbonate with small close-in charges with frame set-ups that permit a rapid pressure clearing time may give an unconservative estimate of blast capacity in many real world threat scenarios. [Pg.142]

A general issue is the need to design detectors against a specific set of threat scenarios or target materials. It is important not to be driven by the technology but to address the operational requirement by whatever means is most effective. An explosives trace detector is unlikely to be the right solution if the threat is from smuggled knives. [Pg.4]

Blanchard DC, Griebel G, Blanchard RJ (2001a) Mouse defensive behavior pharmacological and behavioral assays for anxiety and panic. Neurosci Biobehav Rev 25 205-218 Blanchard DC, Hynd AL, Minke KA, Minemoto T, Blanchard RJ (2001b) Human defense behaviors to threat scenarios show parallels to fear- and anxiety-related defense patterns of non-human mammals. Neurosci Biobehav Rev 25 761-770 Blanchard DC, Griebel G, Blanchard RJ (2003) The mouse defense test battery pharmacological and behavioral assays for anxiety and panic. Eur J Pharmacol 463 97-116 Blanchard RJ, Blanchard DC (1989) Anti-predator defense behaviors in a visible burrow system. J Comp Psychol 103 70-82... [Pg.61]

Blanchard C, ffynd AL, Minke KA, Minemoto T, Blanchard RJ (2001) Human defensive behaviors to threat scenarios show parallels to fear- and anxiety-related defense patterns of non-human mammals. Neurosci Biobehav Rev 25 761-770 Bonham AC (1995) Neurotransmitters in the CNS control of breathing. Respir Physiol 101 219-230... [Pg.463]

Continuing work to clarify and to preplan the national response to such issues as the 15 threat scenarios, which are expected to encompass the most likely responses, as well as pandemic influenza. [Pg.26]

A TSVA can be designed to analyze security risk from a wide range of threats, from vandalism to terrorism. In theory, risk is a function of the consequence and likelihood of the range of credible transportation threat scenarios. For accidental risk analyses, consequence and likelihood are evaluated directly, but in secmity analyses, likelihood is evaluated as a function of vulnerability and threat. Therefore, security risk is defined as a measure of the consequences, vulnerabilities, and threats ... [Pg.122]

Individual protection must provide protection from an ever-changing threat scenario, while maximizing the effectiveness of the individual warfighter. Chemical and biological threats are physically transmitted to the warfighter as aerosols, vapors, and liquids, or through direct contact with such contaminated materials as... [Pg.30]

Breakout Session 3a Brainstorm Blue-Team Counter measures to Presented Nano-Enabled Threat Scenarios Brainstorm Red-Team Circumventions to Presented Nano-Enabled Countermeasures Scenarios Breakout Session 4 Brainstorm research directions underlying or related to countermeasures or threats (Note only research directions underlying countermeasures will be used as input to Breakout Session 5)... [Pg.149]

Safety/Mission critical systems are required to demonstrate that operational capability is maintained for all the threat scenarios. Safety is to be demonstrated for ordnance, fuels and personnel. [Pg.159]

Stage 1 - Occurrence Estimate the probability of each threat scenario occurring (for example, the chances of being shot at by a sniper using rifle bullets unified with the likelihood of fiagmenlationftom an explosion, while walking in a patrol). [Pg.203]

We reuse safety analysis tools that were presented earlier to assess the security of the model. We use the Cecilia OCAS Sequence Generator in order to generate threat scenarios leading to a threat condition. We want to use the DALculator in order to analyse threat scenarios in order to allocate a security level with nodes of an avionics platform. [Pg.277]

We generated all threat scenarios including a maximum of 6 threat events. As in the case of MCS, a threat scenario is a sequence of pairs of the form CpName.ThreatName that starts from the initial state of the system where no attack is launched and leads to a state where the system is attacked. In a threat... [Pg.277]

Let us consider a threat scenario leading to the erroneous update of the Flight Management software. [Pg.278]

This Threat Scenario is made of two pairs. The first pair Agent.T init ... [Pg.278]

Let us now consider a more complex Threat Scenario leading to the loss of update of the Flight Management function. This scenario involves the propagation by the router of an attack. [Pg.278]

Among the 13 threat scenarios that lead to the loss of the Flight Management there are 11 scenarios of size 2, and 2 of size 3. Among the 40 threat scenarios that lead to an erroneous behaviour of the Flight Management there are 9 scenarios of size 2, 21 of size 3 and 10 of size 4. All these scenarios can be reviewed in order to check whether there are enough security mechanisms in the avionics platform. [Pg.278]

We used the DALculator tool to check the allocation of a Security Level to each of the components that appear in the threat scenarios. The Security Level of security mechanisms measures the expected efficiency of this mechanism. The Security Level for other nodes can be seen as a level of Trust in the node. The Security Level is measured using the same range of values as the DAL from E to A. [Pg.279]

The OCAS sequence generator was used successfully to generate Threat Scenarios. As the models could include both fault and threat events, it should be possible to generate scenarios that combine fault and threats in order to analyse complex requirements mixing safety and security. [Pg.280]

Having developed Cl assets and H T ontologies, the following step consisted of connecting the two ontologies. It was done by assessment of actual and potential vulnerabilities of Cl assets to specific hazards and threats. Vulnerability can be understood as the susceptibility of the infrastructure to threat scenarios (Ezell, 2007). [Pg.52]

The risk reduction AR in Stewart and Mueller (2011) is presented as risk percentage achieved by the presence of advanced image technology in airports. The paper by Stewart and Mueller (2011) considers a multidimensional decision problem with many possible interactions between security measures, threat scenarios, threat probabilities, risk reduction and losses. This means that it considers the risk reduction of several security measures. In this research, we will not consider the combination of different control measures, but rather focus on one security device at a time. [Pg.410]

In this case the influence of corrosion is completely eliminated from the threat scenario s. The lowering of the frequency for LoC s is negligible. This means that the current corrosion controls are sufficiently effective in preventing LoC s. [Pg.1366]

Common threat scenarios, which present methods and tactics that could be employed in attacks against the U.S. infrastructure... [Pg.108]

Threat Scenario Likely Potential immediate Resources/systems/plans for Remarks (yes/no) effects mitigation, restoration,... [Pg.29]


See other pages where Threat scenarios is mentioned: [Pg.38]    [Pg.258]    [Pg.230]    [Pg.238]    [Pg.9]    [Pg.63]    [Pg.84]    [Pg.22]    [Pg.36]    [Pg.91]    [Pg.95]    [Pg.434]    [Pg.278]    [Pg.89]    [Pg.49]    [Pg.334]    [Pg.241]    [Pg.436]    [Pg.41]   
See also in sourсe #XX -- [ Pg.4 ]




SEARCH



Scenario, scenarios

Scenarios

Threat

© 2024 chempedia.info