The DBT is an effective tool to determine the correct level of physical protection needed based on a thorough analysis of current threats. A DBT analysis can help avoid excess protection and save time and money.
Here's what a Design Basis Threat analysis is comprised of:
Internal vs External Adversaries
An adversary is any individual or group of individuals who have the intent or capability to perform malicious acts. One of the most important parts of a DBT are internal adversaries, considered to be "insider threats." Insider threats could be individuals with access to facilities working in collusion with external groups, or individuals who could be accidently—or intentionally—providing information about plant operations that may be used by external parties to conduct acts of sabotage or terrorism. Other insider threats could be people capable of deactivating alarms and emergency safety systems or delivering explosive materials to sensitive areas.
Identifying Potential Malicious Acts
It's not enough to simply identify adversaries. It's also important to identify the kind of malicious threats or acts those adversaries may pose or threaten to commit. Identifying potential events and scenarios that could pose a threat to infrastructure and systems is essential so as to build in safeguards and conduct prevention activities. Potential harmful acts could be the theft of essential materials, sabotage of facilities and of essential machines, or the diversion of supply chains.
Attributes and Characteristics of Adversaries
The relevant attributes and characteristics of potential adversaries include their motivation, intention and capability to pose a threat. Motivation to commit harmful acts could stem from ideological, political or economic avenues. The intent to commit harmful and illegal acts that ultimately threaten the safety of critical infrastructure may be indicated by the possession by individuals or groups of unauthorized and restricted materials, blueprints and plans etc. Capabilities of specified adversaries that need to be identified include weapons, tools, insiders and collusion that may be available to them. It's also important to determine the number of individuals that may be involved and their skill sets.
Design and Evaluation
The DBT can help identify and establish the objectives and requirements of the physical protection system and determine the design of the system according to identified threats. After its role in creating the physical protection system, the DBT can then help in its continued evaluation. The DBT can be used to conduct vulnerability assessment and performance testing. It can also identify protection requirements that may require coordination with state or government agencies.
The Design Basis Threat assessment is a useful tool for evaluating the design and performance criteria of a physical protection system in any sector, from nuclear power to electricity production plants and power grids. In a world of increased national and international sources of terrorist activities and threats, knowing the weaknesses and limitations in infrastructure design and its protection systems is essential.
Source : articlesbase.com
0 comments:
Post a Comment