Cover Image

Not for Sale



View/Hide Left Panel
Click for next page ( 9


The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement



Below are the first 10 and last 10 pages of uncorrected machine-read text (when available) of this chapter, followed by the top 30 algorithmically extracted key phrases from the chapter as a whole.
Intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text on the opening pages of each chapter. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

Do not use for reproduction, copying, pasting, or reading; exclusively for search engines.

OCR for page 8
Chapter 3: The Tool 9 Sheet 1: Evaluation Weights Data entry of evaluation criteria weights. Hidden Calculations Sheet Calculates Utils from evaluation weights on Sheet 1 and ranks on Sheet 4. Sheet 2: Valuations Copies characteristics from Sheet Allows user to sort 2 for viewing. GSMs by "utils." Copies evaluation weights from Copies character- Sheet 1 for viewing. istics from Sheet 3. Sheet 4: Applicability Ranks Sheet 3: Characterization Sheet 5: Costs Data entry of ranks. Data entry of GSM Data Entry of GSM Copies characteristics from characteristics. Costs and Requisites. Sheet 3 for viewing. Copies characteristics from Sheet 3 for viewing. Sheet 6: Cost-Util & Strengths User sort of GSM by cost-util. Data entry of GSM strengths and weaknesses. Figure 2. Data flow between worksheets of the GSM evaluation tool. 3.2.1 Criteria Group 1: Security Objectives Four general security objectives are considered: deter, detect, deny, and mitigate. A security measure can be selected on the basis of how well it contributes to one or more of these security objectives. Each of these objectives is described below. After each description, enter the number weight from 0 to 5 (see definitions below) that best indicates the relative importance of this objec- tive to your security needs. 0 = not important 3 = moderate importance 1 = low importance 4 = moderate to high importance 2 = low to moderate importance 5 = high importance Importance Security Objectives (0 5) Deter: To cause an adversary to abandon consideration of this site during their planning stage due to the introduction of certain security measures. Deterrence is due to one or both of the following: (a) the target was devalued, (b) the probability of success was decreased. Detect: To discover (a) the planning of a threatening event, such as may be indicated by extensive observation of operations or equipment, or (b) the presence of a threat agent (e.g., weapon or explosive). Deny: To deny access to a target by such measures as barrier reinforcement, unexpected relocation of the target, and patterns that differ from those expected. Mitigate: To reduce the effects of an event when it occurs by either (a) reducing the magnitude of an event (e.g., reduced target size) or (b) preventing the threat agent from being maximally effective (e.g., because of a sprinkler system or rapid identification of a released toxin).