Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/78080
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lord, S. | - |
dc.contributor.author | Nunes-Vaz, R. | - |
dc.date.issued | 2013 | - |
dc.identifier.citation | International Journal of Risk Assessment and Management, 2013; 17(1):19-45 | - |
dc.identifier.issn | 1466-8297 | - |
dc.identifier.issn | 1741-5241 | - |
dc.identifier.uri | http://hdl.handle.net/2440/78080 | - |
dc.description.abstract | Following systems engineering principles, we introduce analytic means to qualitatively judge and quantitatively assess layering of security controls with the aim of optimising risk reduction. The emphasis is on evaluating security controls in real world systems, where complications such as uncertainty, scale, multiple threats, multiple events, and multiple pathways from threat to event to consequences, confound the neat, and often used, picture of layering controls as rings around the bulls-eye of consequences. An example of physical security at a facility is given, with a quantitative illustration of optimising the layering of controls according to cost constraints. Copyright © 2013 Inderscience Enterprises Ltd. | - |
dc.description.statementofresponsibility | Steven Lord, Rick Nunes-Vaz | - |
dc.language.iso | en | - |
dc.publisher | Inderscience | - |
dc.rights | Copyright status unknown | - |
dc.source.uri | http://dx.doi.org/10.1504/ijram.2013.054377 | - |
dc.subject | security risk | - |
dc.subject | security risk analysis | - |
dc.subject | security risk assessment | - |
dc.subject | security risk management | - |
dc.subject | layered security | - |
dc.subject | security-in-depth | - |
dc.subject | security layers | - |
dc.subject | security system design | - |
dc.subject | security system evaluation | - |
dc.subject | security control optimisation | - |
dc.subject | physical security | - |
dc.subject | complex security systems | - |
dc.title | Designing and evaluating layered security | - |
dc.type | Journal article | - |
dc.identifier.doi | 10.1504/IJRAM.2013.054377 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Lord, S. [0000-0002-6142-5358] | - |
Appears in Collections: | Aurora harvest 4 Mathematical Sciences publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.