Security Simulation for Vulnerability Assessment | IEEE Journals & Magazine | IEEE Xplore
Scheduled Maintenance: On Saturday, 19 July, IEEE Xplore will undergo scheduled maintenance from 7:00 AM-11:00 AM ET. During this time, there will be periods when the website will be unavailable.

Security Simulation for Vulnerability Assessment


Abstract:

This discusses simulation technologies developed to "stimulate" an operational command and control security system. Herein, we discuss simulation techniques used to creat...Show More

Abstract:

This discusses simulation technologies developed to "stimulate" an operational command and control security system. Herein, we discuss simulation techniques used to create a virtual model of a facility in which to conduct vulnerability assessment exercises, performance benchmarking, concept of operations (CONOPS) development and operator training. This discusses specific techniques used for creating a 3d virtual environment and simulating streaming IP surveillance cameras and motion detection sensors. In addition, we discuss advanced scenario creation techniques and the modelling of scenario entities, including vehicles, aircraft and personnel. This draws parallels with lessons learned in using air traffic control simulators for operator training, incident recreation, procedure development, and pre-acquisition planning and testing.
Published in: IEEE Aerospace and Electronic Systems Magazine ( Volume: 22, Issue: 9, September 2007)
Page(s): 11 - 16
Date of Publication: 30 September 2007

ISSN Information:


Contact IEEE to Subscribe

References

References is not available for this document.