• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 10
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A Site Planning and Design Process for Antiterrorism Practices

Peart, Wilbur L. 03 January 2001 (has links)
This study explores a solution to a growing problem involving the landscapes of many prominent landmarks in America. The probability that terrorists will target and attack public and private sites has mandated increased security presence. The initial response was to surround sensitive facilities with barriers and guards. Thus, the images of these sites intended to be publicly open and welcoming are being transformed to seemingly modern fortresses. To date, the solution to the problem has focused on sophisticated engineering and electronics to help protect vulnerable architecture. Meanwhile, the potential contribution of the landscape architecture profession has not been fully recognized. This thesis develops a planning process to guide the integration of site design and physical security. It describes the role of the landscape architect on design teams charged with the complex task of protecting against terrorism. The document provides the landscape architect with a flowchart, site images, and a step-by-step process that leads to reconciliation of conflicting needs. The thesis culminates with a conceptual schematic site design that demonstrates how the site planning and design process proposed in this thesis can be a mechanism to achieve both secure and socially desirable landscapes. This thesis helps resolve the current dilemma of how to maintain an adequate degree of security while preserving a sense of openness on a site. The paper identifies functions specific to the landscape architecture profession that ease and improve collaboration on secure site design. It identifies a niche that has the potential to increase the demand for landscape architectural services. Most importantly, the planning and design process proposed in this document fills a void in the existing literature by addressing the significance of landscape architecture in antiterrorism practices. / Master of Landscape Architecture
2

Analytical foundations of physical security system assessment

Graves, Gregory Howard 30 October 2006 (has links)
Physical security systems are intended to prevent or mitigate potentially catastrophic loss of property or life. Decisions regarding the selection of one system or configuration of resources over another may be viewed as design decisions within a risk theoretic setting. The problem of revealing a clear preference among design alternatives, using only a partial or inexact delineation of event probabilities, is examined. In this dissertation, an analytical framework for the assessment of the risk associated with a physical security system is presented. Linear programming is used to determine bounds on the expected utility of an alternative, and conditions for the separation of preferences among alternatives are shown. If distinguishable preferences do not exist, techniques to determine what information may help to separate preferences are presented. The linear programming approach leads to identification of vulnerabilities in a security system through an examination of the solution to the dual problem. Security of a hypothetical military forward operating base is considered as an illustrative example. For two alternative security schemes, the uncertainty inherent in the scenario is represented using probability assessments consisting of bounds on event probabilities and exact probability assignments. Application of the framework reveals no separation of preferences between the alternatives. Examination of the primal and dual solutions to the linear programming problems, however, reveals insights into information which, if obtained, could lead to a separation of preferences as well as information on vulnerabilities in one of the alternative security postures.
3

Physical Security System Sensitivity to DBT Perturbations

Conchewski, Curtis 2012 August 1900 (has links)
This thesis examines how perturbing selected adversary capabilities in a design basis threat (DBT) may affect the assessment of a facility's security system performance. We found that using a strictly defined DBT to design and analytically test facility security systems can lead to invalid assessments that security measures are meeting standards. Design Basis Threats are intended to represent the most severe yet realistic attack a facility might face. However, the static nature of the standard DBT makes it unable to test the performance of a facility security system in the case where a specialized adversary may possess different capabilities than defined in the DBT. Our analysis of security system performance for various modeled facilities revealed significant vulnerabilities to certain perturbations of adversary capabilities. These vulnerabilities went undetected when the original strictly defined graded DBT was used in the assessment procedure. By maximizing one adversary capability at the expense of others, a specialized adversary force was able to efficiently defeat each facility. To address this problem, we proposed employing a so-called "point-based" DBT as an alternative to the existing strictly defined DBT. In a point-based DBT, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities will outweigh the additional cost of generating a point-based DBT, especially if the vulnerabilities are identified during the initial design of the security system.
4

Autonomous Highway Systems Safety and Security

Sajjad, Imran 01 May 2017 (has links)
Automated vehicles are getting closer each day to large-scale deployment. It is expected that self-driving cars will be able to alleviate traffic congestion by safely operating at distances closer than human drivers are capable of and will overall improve traffic throughput. In these conditions, passenger safety and security is of utmost importance. When multiple autonomous cars follow each other on a highway, they will form what is known as a cyber-physical system. In a general setting, there are tools to assess the level of influence a possible attacker can have on such a system, which then describes the level of safety and security. An attacker might attempt to counter the benefits of automation by causing collisions and/or decreasing highway throughput. These strings (platoons) of automated vehicles will rely on control algorithms to maintain required distances from other cars and objects around them. The vehicle dynamics themselves and the controllers used will form the cyber-physical system and its response to an attacker can be assessed in the context of multiple interacting vehicles. While the vehicle dynamics play a pivotal role in the security of this system, the choice of controller can also be leveraged to enhance the safety of such a system. After knowledge of some attacker capabilities, adversarial-aware controllers can be designed to react to the presence of an attacker, adding an extra level of security. This work will attempt to address these issues in vehicular platooning. Firstly, a general analysis concerning the capabilities of possible attacks in terms of control system theory will be presented. Secondly, mitigation strategies to some of these attacks will be discussed. Finally, the results of an experimental validation of these mitigation strategies and their implications will be shown.
5

Physical Security Assessment of a Regional University Computer Network

Timbs, Nathan H 01 December 2013 (has links) (PDF)
Assessing a network's physical security is an essential step in securing its data. This document describes the design, implementation, and validation of PSATool, a prototype application for assessing the physical security of a network's intermediate distribution frames, or IDFs (a.k.a. "wiring closets"). PSATool was created to address a lack of tools for IDF assessment. It implements a checklist-based protocol for assessing compliance with 52 security requirements compiled from federal and international standards. This checklist can be extended according to organizational needs. PSATool was validated by using it to assess physical security at 135 IDFs at East Tennessee State University. PSATool exposed 95 threats, hazards, and vulnerabilities in 82 IDFs. A control was recommended for each threat, hazard, and vulnerability discovered. The administrators of ETSU's network concluded that PSATool's results agreed with their informal sense of these IDFs' physical security, while providing documented support for improvements to IDF security.
6

Cyber-Physical Security for Additive Manufacturing Systems

Sturm, Logan Daniel 16 December 2020 (has links)
Additive manufacturing (AM) is a growing section of the advanced manufacturing field and is being used to fabricate an increasing number of critical components, from aerospace components to medical implants. At the same time, cyber-physical attacks targeting manufacturing systems have continued to rise. For this reason, there is a need to research new techniques and methods to ensure the integrity of parts fabricated on AM systems. This work seeks to address this need by first performing a detailed analysis of vulnerabilities in the AM process chain and how these attack vectors could be used to execute malicious part sabotage attacks. This work demonstrated the ability of an internal void attack on the .STL file to reduce the yield load of a tensile specimen by 14% while escaping detection by operators. To mitigate these vulnerabilities, a new impedance-based approach for in situ monitoring of AM systems was created. Two techniques for implementing this approach were investigated, direct embedding of sensors in AM parts, and the use of an instrumented fixture as a build plate. The ability to detect changes in material as small as 1.38% of the printed volume (53.8 mm3) on a material jetting system was demonstrated. For metal laser powder bed fusion systems, a new method was created for representing side-channel meltpool emissions. This method reduces the quantity of data while remaining sensitive enough to detect changes to the toolpath and process parameters caused by malicious attacks. To enable the SCMS to validate part quality during fabrication required a way to receive baseline part quality information across an air-gap. To accomplish this a new process noise tolerant method of cyber-physical hashing for continuous data sets was presented. This method was coupled with new techniques for the storage, transmission, and reconstructing of the baseline quality data was implemented using stacks of "ghost" QR codes stored in the toolpath to transmit information through the laser position. A technique for storing and transmitting quality information in the toolpath files of parts using acoustic emissions was investigated. The ATTACH (additive toolpath transmission of acoustic cyber-physical hash) method used speed modulation of infill roads in a material extrusion system to generate acoustic tones containing quality information about the part. These modulations were able to be inserted without affecting the build time or requiring additional material and did not affect the quality of the part that contained them. Finally, a framework for the design and implementation of a SCMS for protecting AM systems against malicious cyber-physical part sabotage attacks was created. The IDEAS (Identify, Define, Establish, Aggregate, Secure) framework provides a detailed reference for engineers to use to secure AM systems by leveraging the previous work in vulnerability assessment, creation of new side-channel monitoring techniques, concisely representing quality data, and securely transmitting information to air-gapped systems through physical emissions. / Doctor of Philosophy / Additive manufacturing (AM), more widely known as 3D printing, is a growing field of manufacturing where parts are fabricated by building layers of material on top of each other. This layer-based approach allows the production of parts with complex shapes that cannot be made using more traditional approaches such as machining. This capability allows for great freedom in designing parts, but also means that defects can be created inside of parts during fabrication. This work investigates ways that an adversary might seek to sabotage AM parts through a cyber-physical attack. To prevent attacks seeking to sabotage AM parts several new approaches for security are presented. The first approach uses tiny vibrations to detect changes to part shape or material by attaching a small sensor either directly to the parts or to the surface that they are built on. Because an attack that sabotages an AM system (3D printer) could also affect the systems used to detect part defects these systems should be digitally separated from each other. By using a series of QR codes fabricated by the AM system along with the parts, information can be sent from the AM system to the monitoring system through its sensors. This prevents a cyber-attack from jumping from the AM system to the monitoring system. By temporarily turning off the laser power and tracking the movements of the guiding mirrors the QR code information can be sent to the monitoring system without having to actually print the QR code. The information stored in the QR code is compared to the emission generated when fabricating the parts and is used to detect if an attack has occurred since that would change the emissions from the part, but not from the QR code. Another approach for sending information from the AM system using physical emissions is by using sounds generated during part fabrication. Using a desktop scale 3D printer, the speed of certain movements was increased or decreased. The change in speed causes the sound emitted from the printer to change, while not affecting the actual quality of the print. By using a series of tones, similar to Morse code, information can be sent from the printer. Research was performed on the best settings to use to transmit the information as well as how to automatically receive and decode the information using a microphone. The final step in this work is a framework that serves as a guide for designing and implementing monitoring systems that can detect sabotage attacks on AM parts. The framework covers how to evaluate a system for potential vulnerabilities and how to use this information to choose sensors and data processing techniques to reduce the risk of cyber-physical attacks.
7

The relative performance and consequences of protecting crowded places from vehicle borne improvised explosive devices

Harre-Young, Steven N. January 2012 (has links)
Crowded places have been the target of terrorist attacks for many years. Their inherent nature has resulted in a vulnerability to a range of attacks, most notably the threat of vehicle-borne improvised explosive devices (VBIEDs). Government agendas have been seeking to reduce the extent of this vulnerability, by encouraging those who are responsible for the design, construction and operation of such places to incorporate counter-terrorism measures (CTMs) into their designs, and where necessary, retro-fit them into existing places. However, little is known about what measures can be used, as well as their performance and consequences. The aim of the research is therefore to identify the aforementioned range of measures through the development of a typology that also examines their relative performance and consequences for a range of scenarios, in order to inform key decision makers who are responsible for the protection of crowded places. Through the use of a qualitative research strategy and respective research methods, interviews, site visits and document analysis were carried out in both the UK and in the USA. A total of 47 participants were recruited for the research, with the collection of data spanning 16 months. A preliminary study was undertaken that determined a range of influences on whether crowded places are protected, as well as influences on the value of CTMs themselves. A theoretical framework was developed to capture and understand those influences. Conventional data analysis methods and internal validation techniques were used to subject the data to methodological rigour, ensuring the validity and reliability of the research. While the negative consequences of incorporating CTMs can be profound, every CTM that can be used has additional benefits; measures can be incorporated at no cost and can even generate revenue; and designing-in CTMs has a number of advantages over retro-fitting them. This research s contribution to knowledge in relation to methodology, empiricism, theory, industry, and policy has resulted in the creation of a significant amount of guidance for key decision makers who are responsible for the design, construction and operation of crowded places, as well as providing data on the benefits that can be gained from incorporating mitigative measures that is of interest to those who have a role to play in the design, construction and operation of the built environment more broadly. Recommendations for further research posit that greater understanding is needed in relation to the specific monetary costs of CTMs themselves, the experience of users of protected places, the implications of invisible CTMs, and the need for research into the assessment and incorporation of proportionality into the built environment. Practical recommendations put forward the need for clarification of legislation in relation to duties of care, the dissemination of the incentives to protect, and benefits of protecting, crowded places, the need for further debate and transparency regarding proportionality and what constitutes proportionate design, and the need to encourage greater engagement between stakeholders and the means through which this can occur. The research posits that legislative requirements encompassing the mitigation of terrorist attacks are apparent, and that therefore, organisations should incorporate CTMs into vulnerable places, yet as previously indicated, such CTMs do not have to cost anything.
8

School Active Shooter Prevention Measurements

Katherine E Reichart (6632084) 14 May 2019 (has links)
<div> <p>This research investigated how to measure school active shooter safety against current policies in place regarding two different areas of school climate. Using the State of Indiana as a case study, 55 different schools from 38 different counties, various socioeconomic environments and school types (public, private, etc.) were surveyed. This collected data was used to represent a sample and representation of active shooter safety in K- 12 schools in Indiana. Research was conducted through a survey of approximately 40 questions posed to the principal of a school. The survey was anonymously distributed, and any identifiable information was assigned a numerical code. Anonymized demographics were considered and measured as well to determine how active shooter prevention is treated amongst them. After the study was conducted, the data shows how demographics, policies, and procedures affect school active shooter prevention. Analysis showed that school size may relate to lower social emotional security scores. Additionally, middle schools appear to score higher on social-emotional security than K-12 schools. Nonpublic schools also appear to score less on active shooter prevention than public schools. There is a moderate effect between the two. Schools and policymakers should account for this when developing active shooter safety plans. </p> </div> <br>
9

Assessing the Physical Security of IDFs with PSATool: a Case Study

Bista, Sulabh 01 December 2015 (has links)
PSATool is a checklist-based, web-based application for assessing the physical security of Intermediate Distribution Frameworks. IDFs, or wiring closets, are an integral if often neglected component of information security. Earlier work by Timbs (2013) identified 52 IDF-related security requirements based on federal and international standards for physical security. PSATool refines Timbs’ prototype application for IDF assessment, extending it with support for mobile-device-based data entry. PSATool was used to assess 25 IDFs at a regional university, a college and a manufacturing corporation, with an average of 9 minutes per assessment. Network managers and assessors involved in the assessments characterized PSATool as suitable for creating assessments, usable by IT department personnel, and accurate, in terms of its characterizations of IDF status.
10

Network Capability Analysis and Related Implementations Improvements Recommendations

Tabassum, Mujahid, Elkhateeb, Khamees January 2009 (has links)
<p>The networking field has become a core component for any company. All of the</p><p>businesses rely on the networking industry, due its vastness and significance. Every day</p><p>companies are planning and thinking to develop better strategies that can offer efficient</p><p>and reliable communication solutions between their employees and customers for</p><p>maximum revenue. The planning of a company’s network requires a lot of resources and</p><p>aspects to study, and to evaluate them carefully to build a comprehensive secure and</p><p>reliable platform. It is the job of a network administrator to take care of the company’s</p><p>network infrastructure and upgrade or update the required components and applications</p><p>from time-to-time that can follow new standards.</p><p>This thesis is a practical work aimed to evaluate a company network infrastructure in its</p><p>real environment. The purpose of this thesis is to evaluate different aspects of the</p><p>network infrastructure used such as VPN, WLAN, firewall and physical security and give</p><p>recommendations to make their performance better and to offer more advanced strategies.</p><p>This study will also provide an inclusive observation of the company’s needs and their</p><p>network infrastructure, and will provide a concept how to evaluate and fix small mistakes,</p><p>the kind of problems that can occur in an evolving company network. Lastly, this research</p><p>will make recommendations and suggest a possible implementation on the studied</p><p>network infrastructure.</p>

Page generated in 0.0554 seconds