Security Simulation for Vulnerability Assessment

This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking,...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Hennessey, B., Norman, B., Wesson, R.B.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 50
container_issue
container_start_page 46
container_title
container_volume
creator Hennessey, B.
Norman, B.
Wesson, R.B.
description This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing
doi_str_mv 10.1109/CCST.2006.313428
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_4105315</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4105315</ieee_id><sourcerecordid>4105315</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-1314bf50263aaf215b91e8e542091ea8a3d46f2a063b1d2faf0f0b49c43c9d763</originalsourceid><addsrcrecordid>eNotj81rhDAUxEM_oHa790Iv_gPa915eEj0u0i9Y6MFtr0vUBFLULUYP-9_X0s5lBn4wzAhxj5AjQvlYVfUhJwCdS5RMxYVICJXMwDBdiltkYgY0bK5EgmAw08rQjdjG-AWrWLEkSgTUrl2mMJ_TOgxLb-dwGlN_mtLPpR_dZJvQ_8JdjC7GwY3znbj2to9u--8b8fH8dKhes_37y1u122cBjZozlMiNV0BaWuvXZU2JrnCKCdZgCys71p4saNlgR9568NBw2bJsy85ouREPf73BOXf8nsJgp_OREZRcb_4AhTNFiw</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Security Simulation for Vulnerability Assessment</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Hennessey, B. ; Norman, B. ; Wesson, R.B.</creator><creatorcontrib>Hennessey, B. ; Norman, B. ; Wesson, R.B.</creatorcontrib><description>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</description><identifier>ISSN: 1071-6572</identifier><identifier>ISBN: 1424401747</identifier><identifier>ISBN: 9781424401741</identifier><identifier>EISSN: 2153-0742</identifier><identifier>DOI: 10.1109/CCST.2006.313428</identifier><language>eng</language><publisher>IEEE</publisher><subject>Air traffic control ; Aircraft ; Cameras ; Command and control systems ; Motion detection ; Personnel ; Security ; Surveillance ; Vehicles ; Virtual environment</subject><ispartof>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology, 2006, p.46-50</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4105315$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,2052,27902,54895</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4105315$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Hennessey, B.</creatorcontrib><creatorcontrib>Norman, B.</creatorcontrib><creatorcontrib>Wesson, R.B.</creatorcontrib><title>Security Simulation for Vulnerability Assessment</title><title>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology</title><addtitle>CCST</addtitle><description>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</description><subject>Air traffic control</subject><subject>Aircraft</subject><subject>Cameras</subject><subject>Command and control systems</subject><subject>Motion detection</subject><subject>Personnel</subject><subject>Security</subject><subject>Surveillance</subject><subject>Vehicles</subject><subject>Virtual environment</subject><issn>1071-6572</issn><issn>2153-0742</issn><isbn>1424401747</isbn><isbn>9781424401741</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2006</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotj81rhDAUxEM_oHa790Iv_gPa915eEj0u0i9Y6MFtr0vUBFLULUYP-9_X0s5lBn4wzAhxj5AjQvlYVfUhJwCdS5RMxYVICJXMwDBdiltkYgY0bK5EgmAw08rQjdjG-AWrWLEkSgTUrl2mMJ_TOgxLb-dwGlN_mtLPpR_dZJvQ_8JdjC7GwY3znbj2to9u--8b8fH8dKhes_37y1u122cBjZozlMiNV0BaWuvXZU2JrnCKCdZgCys71p4saNlgR9568NBw2bJsy85ouREPf73BOXf8nsJgp_OREZRcb_4AhTNFiw</recordid><startdate>200610</startdate><enddate>200610</enddate><creator>Hennessey, B.</creator><creator>Norman, B.</creator><creator>Wesson, R.B.</creator><general>IEEE</general><scope>6IE</scope><scope>6IH</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIO</scope></search><sort><creationdate>200610</creationdate><title>Security Simulation for Vulnerability Assessment</title><author>Hennessey, B. ; Norman, B. ; Wesson, R.B.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-1314bf50263aaf215b91e8e542091ea8a3d46f2a063b1d2faf0f0b49c43c9d763</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2006</creationdate><topic>Air traffic control</topic><topic>Aircraft</topic><topic>Cameras</topic><topic>Command and control systems</topic><topic>Motion detection</topic><topic>Personnel</topic><topic>Security</topic><topic>Surveillance</topic><topic>Vehicles</topic><topic>Virtual environment</topic><toplevel>online_resources</toplevel><creatorcontrib>Hennessey, B.</creatorcontrib><creatorcontrib>Norman, B.</creatorcontrib><creatorcontrib>Wesson, R.B.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan (POP) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP) 1998-present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Hennessey, B.</au><au>Norman, B.</au><au>Wesson, R.B.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Security Simulation for Vulnerability Assessment</atitle><btitle>Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology</btitle><stitle>CCST</stitle><date>2006-10</date><risdate>2006</risdate><spage>46</spage><epage>50</epage><pages>46-50</pages><issn>1071-6572</issn><eissn>2153-0742</eissn><isbn>1424401747</isbn><isbn>9781424401741</isbn><abstract>This paper discusses simulation technologies developed to "stimulate" an operational command and control security system. The paper discusses simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. The paper discusses the specific techniques used for creating a 3D virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition the paper discusses advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. The paper draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development and pre-acquisition planning and testing</abstract><pub>IEEE</pub><doi>10.1109/CCST.2006.313428</doi><tpages>5</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1071-6572
ispartof Proceedings 40th Annual 2006 International Carnahan Conference on Security Technology, 2006, p.46-50
issn 1071-6572
2153-0742
language eng
recordid cdi_ieee_primary_4105315
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Air traffic control
Aircraft
Cameras
Command and control systems
Motion detection
Personnel
Security
Surveillance
Vehicles
Virtual environment
title Security Simulation for Vulnerability Assessment
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-29T03%3A08%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Security%20Simulation%20for%20Vulnerability%20Assessment&rft.btitle=Proceedings%2040th%20Annual%202006%20International%20Carnahan%20Conference%20on%20Security%20Technology&rft.au=Hennessey,%20B.&rft.date=2006-10&rft.spage=46&rft.epage=50&rft.pages=46-50&rft.issn=1071-6572&rft.eissn=2153-0742&rft.isbn=1424401747&rft.isbn_list=9781424401741&rft_id=info:doi/10.1109/CCST.2006.313428&rft_dat=%3Cieee_6IE%3E4105315%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=4105315&rfr_iscdi=true