SlideShare a Scribd company logo
LAUR-04-0385 Journal of Safety Research 35, 245-248 (2004) 
Adversarial Safety Analysis: 
Borrowing the Methods of Security Vulnerability Assessments 
Roger G. Johnston, Ph.D., CPP 
Vulnerability Assessment Team 
Los Alamos National Laboratory 
MS J565, Los Alamos, NM 87545 USA 
phone: 505-667-7414 
fax: 505-665-4631 
email: rogerj@lanl.gov 
Abstract 
Introduction: Safety and security share numerous attributes. The author, who heads the (Security) 
Vulnerability Assessment Team at Los Alamos National Laboratory, therefore argues that 
techniques used to optimize security might be useful for optimizing safety. Optimizing Security: 
There are 3 main ways to attempt to improve security—security surveys, risk assessment (or 
“design basis threat”), and vulnerability assessments. The latter is usually the most effective. 
Safety Analogs: Vulnerability assessment techniques used to improve security can be applied to 
safety analysis—even though safety is not ordinarily viewed as having malicious adversaries (other 
than hazards involving deliberate sabotage). Thinking like a malicious adversary can nevertheless 
have benefits in identifying safety vulnerabilities. Suggestions: The attributes of an effective safety 
vulnerability assessment are discussed, and recommendations are offered for how such an 
adversarial assessment might work. Conclusion: A safety vulnerability assessment can potentially 
provide new insights, a fresh and vivid perspective on safety hazards, and increased safety 
awareness. 
keywords: vulnerability assessment, risk assessment, security, psychology of safety, safety 
evaluations 
1
Biographical Sketch: 
Roger G. Johnston, Ph.D., CPP is Team Leader for the Advanced Diagnostics and 
Instrumentation Group in the Chemistry Division at Los Alamos National Laboratory (LANL). He 
also heads the LANL Vulnerability Assessment Team (VAT). The VAT has provided consulting, 
vulnerability assessments, and physical security solutions for over two dozen different government 
agencies and private companies. Johnston received his undergraduate degree from Carleton College 
in 1977, M.S. and Ph.D. degrees in physics from the University of Colorado in 1983, and his 
Certified Protection Professional (CPP) certification from the American Society for Industrial 
Security (ASIS) in 1997. His research interests include tamper & intrusion detection, cargo 
security, and nuclear safeguards. He is the Editor of the Journal of Physical Security. 
2
Introduction 
Safety and security have a lot in common. They both deal with probabilities and risk, and are both 
intrinsically preventative in focus. Both need to be dealt with in a proactive manner, but both often 
end up (in the real world) being handled reactively—typically with considerable finger-pointing, 
retaliation, recrimination, and hysteria after incidents occur, especially in large organizations. Both 
safety and security are often viewed by employees as impediments to productivity. Both can be 
seriously hampered by unimaginative managers, reluctant employees, poor communication, 
organizational inertia, and excessive bureaucracy. Optimizing either safety or security requires 
dealing with complex cost/benefit analyses, subtle matters of human and organizational psychology, 
and difficult issues of how to set priorities. Poor implementation of either safety or security 
measures can seriously impact an organization’s productivity, its economics and reputation, and the 
well-being and morale of its employees. 
We have conducted a large number of analyses of physical security in the Vulnerability Assessment 
Team at Los Alamos National Laboratory (LANL, 2003). This paper raises the question of whether 
the type of adversarial analysis we use for security vulnerability assessments might be useful for 
analyzing safety vulnerabilities. The underlying idea is that sometimes techniques borrowed from 
one field can be useful in another field, especially if it has similar attributes. 
Optimizing Security 
In the field of security, there are traditionally 3 ways to improve security: 
1. Security Survey (Broder, 1999). This is a type of walk-around exercise. The security manager 
wanders the spaces and looks for problems, often with a checklist in hand. Security surveys are 
useful because they catch obvious mistakes, such as a hole in the fence, an unlocked door, or a 
guard asleep at his/her station. Security surveys, however, do not usually result in profound 
security improvements because they do not encourage creative thinking. 
2. Risk Assessment, sometimes called “Design Basis Threat” (Garcia, 2001; Roper, 1999). In 
simplistic terms, this involves security managers thinking about the bad things that could happen, 
and then considering what they will do to mitigate those risks. Likelihood and Consequences are 
considered, and Vulnerabilities are given relative priorities. This is a useful approach for security 
but it often fails to result in dramatic security improvements. Why is this? In my experience, it is 
because the security people doing the analysis are often unimaginative. They tend to focus only on 
past security incidents, ignoring changing circumstances and unfamiliar rare-event risks that may be 
far more dangerous. More serious, however, is the fact that they usually have entirely the wrong 
mindset. The security risk assessors are thinking about things from the perspective of the "good 
guys", i.e., people who desperately do not want there to be security problems. As a result—human 
nature being what it is—security risk assessors often see what they want to see (that everything is 
secure), not necessarily what they need to see. 
3
3. Vulnerability Assessment (Johnston and Garcia, 2003). In a security vulnerability assessment, 
unlike the above techniques, we quit being the good guys and pretend to be the bad guys. This 
requires a significant mental coordinate transformation. We try to get into the heads of the bad 
guys, think like them, and eagerly look for security weaknesses and vulnerabilities to exploit. We 
actually want to be troublemakers in our assessments, unlike the non-evil (but unimaginative) 
security managers typically involved in security surveys and risk assessments. Because we want to 
find problems, we do. 
Safety Analogs 
In the field of safety, security techniques 1 and 2 above have obvious analogs. The standard safety 
“walkaround” is similar to the security survey (#1). “What if?” safety exercises, or more formal 
safety risk assessments are like #2. On the surface, however, there wouldn’t appear to be a good 
match for #3 (vulnerability assessments) because there usually isn’t a nefarious adversary for safety 
—ignoring deliberate sabotage. [Deliberate sabotage is more properly thought of as a security issue 
rather than a safety matter. It is likely that most organizations underestimate or even ignore the 
insider security threat (Johnston and Bremer Maerli, 2003).] 
It may nevertheless be possible to have an adversarial vulnerability assessment for safety. The trick 
is to quit thinking like people who don't want there to be safety incidents, and start thinking like 
people (the “bad guys”) who wish for injuries, death, environmental harm, and damage to the 
organization. With that mindset, new safety hazards may suddenly become apparent—or at least 
we can think about safety from a fresh perspective. 
Another potential advantage, at least initially, to this kind of backwards thinking about safety is the 
novelty and shock value. This approach stands in stark contrast to the standard, insipid “think 
safety” slogans used in most organizations. Many organizations also encourage employees to think 
about “what if?” hazard scenarios. But it is psychologically quite different to mentally strive for 
non-safety, to enthusiastically envision scenarios involving injury or death for ourselves or co-workers. 
This is a much more proactive, dynamic, vivid, and personal approach to thinking about 
safety vulnerabilities than waiting around for “what if?” questions to randomly pop into one’s head. 
Moreover, as suggested in the Introduction, safety incidents often generate considerable political 
and career damage to individual employees, supervisors, and managers. The motivation for our 
imaginary evil bad guys might also include the desire to see a much admired and respected co-worker, 
supervisor, or manager get in career trouble as a result of a safety incident. 
An additional reason that this type of adversarial safety analysis may have psychological value to an 
organization is that the existence of “bad guys”—even if imaginary—can help to unify employees 
behind safety. Nothing unites people like a common enemy, even if imaginary. 
4
Suggestions for Conducting an Adversarial Safety Vulnerability Assessment 
An adversarial safety vulnerability assessment should involve first understanding the operations, 
facilities, and employees that are being assessed. The next step is to identify potential safety 
vulnerabilities through brainstorming and analysis. This is followed by evaluating and prioritizing 
the potential vulnerabilities. Finally, we devise practical countermeasures to the safety 
vulnerabilities. 
This process requires having the proper assessment personnel. Outsiders will often be useful since 
they may have fewer conflicts of interest. [One of the reasons that security risk assessments are 
often unsuccessful is that the people conducting the assessment are the same ones providing the 
security services, and thus don’t want there to be security problems. After all, their egos, 
reputations, and performance appraisals are on the line (Johnston and Garcia, 2003).] On the other 
hand, outsiders may have a poor understanding of the realities and unique characteristics of a given 
organization. In many cases, it might be prudent to form a safety vulnerability assessment team 
consisting of both insiders and outsiders. The insiders must include some of the people conducting 
the operations being evaluated. 
The best assessment personnel will be clever, creative, hands-on people with a history of thinking 
outside the box. Troublemakers, loophole finders, rule benders, smart alecks, renegades, and 
hackers—the very people that should make us nervous in regards to daily safety (or security) 
concerns—are exactly the types of individuals that should be part of the adversarial assessment 
team. They will instinctively be able to spot hazards and potential mischief that other, less jaded 
individuals miss. 
In many cases, it will not be practical to assemble a formal adversarial vulnerability assessment 
team. Instead, regular employees can be asked to assess their own working environment, but to do 
so as “bad guys”. In getting employees to think like “bad guys”, organizations should exploit the 
existence of any readily identifiable adversaries, such as a competing company or a troublesome 
governmental auditing agency. Employees may find it much easier to think like bad guys if they 
picture themselves as being these “villains”. 
Employees engaged in adversarial safety vulnerability assessments must never be subject to 
retaliation (or fear that they might) for finding potential safety problems. “Shooting the messenger” 
is a common problem for security vulnerability assessors (Johnston and Garcia, 2003); it must be 
avoided for safety assessments. 
For an adversarial safety vulnerability assessment, we probably do not want to consider deliberate 
sabotage by employees or outsiders. Sabotage is more appropriately thought of as a security issue, 
rather than a safety concern. Thus, one employee deliberately hitting another over the head with a 
5
pipe wrench (for example) is not a safety scenario that needs to be considered in this type of 
assessment. Deliberately tampering with equipment is another act of sabotage that is more of a 
security issue than a safety one. 
In most cases, safety incidents caused by a single mistake or failure should be considered first, 
followed by more complex scenarios that require multiple contingencies. 
Note that in a security vulnerability assessment, the assessors attempt to envision (or even 
demonstrate) concrete actions that bad guys can take in order to accomplish their nefarious 
objectives. The bad guys in the proposed safety adversarial analysis, however, are more passive 
(because we are leaving out deliberate sabotage), though just as malevolent. They are nefarious 
observers who fervently hope for safety incidents to occur, for employees to get hurt or killed, and 
for employees, managers, and supervisors to get in trouble as a result. The “bad guy” assessors 
should gleefully attempt to identify possible ways these things might happen, but they do not 
picture themselves actually taking deliberate actions to make safety incidents occur. That falls into 
the category of sabotage. 
It is particularly important not to misunderstand the word “adversarial”. It is one thing for safety 
assessors to think like “bad guys” as part of a mental construct to assist in discovering safety 
vulnerabilities. It is quite another matter for those same safety assessors to behave in a belligerent 
manner, or to use the safety assessment process (or its resulting recommendations) as a weapon. 
Attempts to unnecessarily stop or interfere with work, threaten and harass employees, institute 
useless paperwork and bureaucracy, waste resources, or otherwise harm the organization are acts of 
sabotage, not safety optimization. 
Effective brainstorming is critical. The vulnerability assessors need to be encouraged to think 
creatively, even recklessly, and to have fun with their “villainous” analysis. Assessors must feel 
free to offer ideas (at least initially) without objections, criticisms, or value judgments from other 
team members. It should be permissible to consider safety incidents that involve, for example, 
flying monkeys, Elvis impersonators, or space aliens; doing so encourages unconventional 
thinking. Only at a later stage, when brainstorming is largely complete, will the possible scenarios 
need to be critically evaluated, then either dismissed or else modified into something more 
probable. 
It is essential throughout the process to maintain enthusiasm for finding mechanisms that can cause 
injury, death, trouble, destruction, and chaos. The goal is to think evil, not think safety. Success 
means finding ways for safety to fail, not seeking to be reassured that everything is fine. Indeed, an 
adversarial safety assessment that finds no new safety vulnerabilities is a waste of time. Safety 
vulnerabilities always exist. Finding none simply means that the process has failed and should be 
redone correctly, ideally with different personnel who will do the job more competently. 
6
Assessors should be sure to consider the psychological status of employees in evaluating safety 
vulnerabilities. Neither safety nor security will be optimal under conditions involving high stress 
levels, widespread disgruntlement, and/or low employee morale (Johnston and Maerli, 2003). 
The adversarial safety vulnerability assessment considered here requires a certain glib suspension of 
the traditional, serious way that safety is usually considered. If managers are not careful, however, 
this could be misinterpreted by employees. Employees need to be convinced that the organization 
really does take safety seriously, and does not want employees to get hurt or employees to get in 
trouble over safety incidents. It must be made clear that the adversarial safety assessment is a kind 
of role-playing exercise (or tool) for putting people in a dramatically different mental framework in 
hopes of gaining fresh insights into safety hazards. 
Conclusion 
This paper presents what may be an unconventional way to think about and to analyze safety. It 
borrows from proven techniques for conducting effective security vulnerability assessments based 
on thinking like a malicious adversary. While security is all about neutralizing adversaries, safety is 
not usually thought of in those terms. Nevertheless, it can be argued that there may be some benefit 
to thinking of safety from the perspective of a malevolent observer. If nothing else, rooting for 
injuries, death, damage, and general mayhem provides a novel, even shocking way to think about 
safety that has the potential for bringing fresh insight and enhanced safety awareness. It may also 
help employees to rally around safety by anthropomorphizing safety hazards in the persona of the 
“bad guys”. 
Acknowledgment and Disclaimer 
Janie Enter provided useful comments. The views expressed in this paper are those of the author 
and should not necessarily be ascribed to Los Alamos National Laboratory or the United States 
Department of Energy. 
7
References 
Broder, J. (1999). Risk analysis and the security survey. Boston, MA: Butterworth-Heinemann. 
Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston, MA: 
Butterworth-Heinemann. 
Johnston, R.G. and Bremer Maerli, M. (2003). The negative consequences of ambiguous 
‘safeguards’ terminology. Proceedings of the Institute for Nuclear Materials Management (INMM) 
44th Annual Meeting, July 13-17, Phoenix, AZ. 
Johnston, R.G. and Garcia, A.R.E. (2003). Effective vulnerability assessments for physical 
security devices, systems, and programs. Österreich Militärische ZeitSchrift (Austrian Military 
Journal), Special Edition on Nuclear Material Protection, February 2003, 51-55. 
LANL Vulnerability Assessment Team. (2003). VAT Home Page: 
http://pearl1.lanl.gov/seals/default.htm. 
Roper C. (1999). Risk assessment for security professionals. Boston, MA: Butterworth- 
Heinemann. 
8

More Related Content

What's hot

Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
Samuel Loomis
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theory
engineerteju
 
2016 Top Security Threats
2016 Top Security Threats2016 Top Security Threats
2016 Top Security Threats
Gail Essen, CPP, PSP
 
A critique of doug hubbards the failure of risk management
A critique of doug hubbards the failure of risk managementA critique of doug hubbards the failure of risk management
A critique of doug hubbards the failure of risk management
Jeran Binning
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
Praveen Vackayil
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
Ersoy AKSOY
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership Role
Brian Donovan
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
Roger Johnston
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
Hank Eng, CISSP, CISA, CISM
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
CSCJournals
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
amiable_indian
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
pbhugenberg3
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
Roger Johnston
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
Jason Smith
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
Martin Lindgren
 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
92pawansingh
 
SECURITY BRIEFING companion to HPSR Security Briefing 13
SECURITY BRIEFING companion to HPSR Security Briefing 13SECURITY BRIEFING companion to HPSR Security Briefing 13
SECURITY BRIEFING companion to HPSR Security Briefing 13
Angela Gunn
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
Andréanne Clarke
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
Beji Jacob
 
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Gordana Dodig-Crnkovic
 

What's hot (20)

Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
To situation awareness theory
To situation awareness theoryTo situation awareness theory
To situation awareness theory
 
2016 Top Security Threats
2016 Top Security Threats2016 Top Security Threats
2016 Top Security Threats
 
A critique of doug hubbards the failure of risk management
A critique of doug hubbards the failure of risk managementA critique of doug hubbards the failure of risk management
A critique of doug hubbards the failure of risk management
 
Risk Assessment Case Study
Risk Assessment Case StudyRisk Assessment Case Study
Risk Assessment Case Study
 
Information Security Risk Management
Information Security Risk Management Information Security Risk Management
Information Security Risk Management
 
Chief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership RoleChief Information Security Officer - A Critical Leadership Role
Chief Information Security Officer - A Critical Leadership Role
 
Design Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical SecurityDesign Reviews Versus Vulnerability Assessments for Physical Security
Design Reviews Versus Vulnerability Assessments for Physical Security
 
Eng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-LatestEng Solutions - Capability Statement-Latest
Eng Solutions - Capability Statement-Latest
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
A Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System RiskA Practical Approach to Managing Information System Risk
A Practical Approach to Managing Information System Risk
 
Common and Concerning Risks In IT
Common and Concerning Risks In ITCommon and Concerning Risks In IT
Common and Concerning Risks In IT
 
Vulnerability Assessment Myths
Vulnerability Assessment MythsVulnerability Assessment Myths
Vulnerability Assessment Myths
 
Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0Jason Anthony Smith - thesis short summary v1.0
Jason Anthony Smith - thesis short summary v1.0
 
when minutes counts
when minutes countswhen minutes counts
when minutes counts
 
Eco secu infocom
Eco secu infocomEco secu infocom
Eco secu infocom
 
SECURITY BRIEFING companion to HPSR Security Briefing 13
SECURITY BRIEFING companion to HPSR Security Briefing 13SECURITY BRIEFING companion to HPSR Security Briefing 13
SECURITY BRIEFING companion to HPSR Security Briefing 13
 
From checkboxes to frameworks
From checkboxes to frameworksFrom checkboxes to frameworks
From checkboxes to frameworks
 
u10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacobu10a1-Risk Assessment Report-Beji Jacob
u10a1-Risk Assessment Report-Beji Jacob
 
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
Risk-based Decision-making Fallacies: Why Present Functional Safety Standards...
 

Viewers also liked

밀양인권침해감시단 보도자료(9) 20131016
밀양인권침해감시단 보도자료(9) 20131016밀양인권침해감시단 보도자료(9) 20131016
밀양인권침해감시단 보도자료(9) 20131016humandasan
 
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론봉조 김
 
Sample California motion to vacate default judgment for extrinsic fraud or mi...
Sample California motion to vacate default judgment for extrinsic fraud or mi...Sample California motion to vacate default judgment for extrinsic fraud or mi...
Sample California motion to vacate default judgment for extrinsic fraud or mi...
LegalDocsPro
 
2015년 8월 신착도서
2015년 8월 신착도서2015년 8월 신착도서
2015년 8월 신착도서
POSTECH Library
 
팀플 수업발표
팀플 수업발표팀플 수업발표
팀플 수업발표yeonji316
 
How to Think Like a Vulnerability Assessor
How to Think Like a Vulnerability AssessorHow to Think Like a Vulnerability Assessor
How to Think Like a Vulnerability Assessor
Roger Johnston
 
Alasql JavaScript SQL Database Library: User Manual
Alasql JavaScript SQL Database Library: User ManualAlasql JavaScript SQL Database Library: User Manual
Alasql JavaScript SQL Database Library: User Manual
Andrey Gershun
 
User Access Manager for IBM Connections (UAM)
User Access Manager for IBM Connections (UAM)User Access Manager for IBM Connections (UAM)
User Access Manager for IBM Connections (UAM)
TIMETOACT GROUP
 
Continence mechanisms
Continence mechanismsContinence mechanisms
Continence mechanisms
drsammour
 
IRD Presentation at the 2010 International Food Aid & Development Conference
IRD Presentation at the 2010 International Food Aid & Development ConferenceIRD Presentation at the 2010 International Food Aid & Development Conference
IRD Presentation at the 2010 International Food Aid & Development Conference
International Relief and Development
 
Worker's compensation know your rights
Worker's compensation   know your rightsWorker's compensation   know your rights
Worker's compensation know your rights
Rene Garcia
 
스마트 모바일 시대의 개발자
스마트 모바일 시대의 개발자스마트 모바일 시대의 개발자
스마트 모바일 시대의 개발자
Jonathan Jeon
 

Viewers also liked (13)

밀양인권침해감시단 보도자료(9) 20131016
밀양인권침해감시단 보도자료(9) 20131016밀양인권침해감시단 보도자료(9) 20131016
밀양인권침해감시단 보도자료(9) 20131016
 
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론
2013 제 2 형 당뇨병 - 진료지침 5판 1부_총론
 
Sample California motion to vacate default judgment for extrinsic fraud or mi...
Sample California motion to vacate default judgment for extrinsic fraud or mi...Sample California motion to vacate default judgment for extrinsic fraud or mi...
Sample California motion to vacate default judgment for extrinsic fraud or mi...
 
2015년 8월 신착도서
2015년 8월 신착도서2015년 8월 신착도서
2015년 8월 신착도서
 
팀플 수업발표
팀플 수업발표팀플 수업발표
팀플 수업발표
 
How to Think Like a Vulnerability Assessor
How to Think Like a Vulnerability AssessorHow to Think Like a Vulnerability Assessor
How to Think Like a Vulnerability Assessor
 
Alasql JavaScript SQL Database Library: User Manual
Alasql JavaScript SQL Database Library: User ManualAlasql JavaScript SQL Database Library: User Manual
Alasql JavaScript SQL Database Library: User Manual
 
제3강
제3강제3강
제3강
 
User Access Manager for IBM Connections (UAM)
User Access Manager for IBM Connections (UAM)User Access Manager for IBM Connections (UAM)
User Access Manager for IBM Connections (UAM)
 
Continence mechanisms
Continence mechanismsContinence mechanisms
Continence mechanisms
 
IRD Presentation at the 2010 International Food Aid & Development Conference
IRD Presentation at the 2010 International Food Aid & Development ConferenceIRD Presentation at the 2010 International Food Aid & Development Conference
IRD Presentation at the 2010 International Food Aid & Development Conference
 
Worker's compensation know your rights
Worker's compensation   know your rightsWorker's compensation   know your rights
Worker's compensation know your rights
 
스마트 모바일 시대의 개발자
스마트 모바일 시대의 개발자스마트 모바일 시대의 개발자
스마트 모바일 시대의 개발자
 

Similar to Adversarial Safety Analysis

Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
Roger Johnston
 
Questions for the article ----Safety Climate How can you measure .docx
Questions for the article ----Safety Climate How can you measure .docxQuestions for the article ----Safety Climate How can you measure .docx
Questions for the article ----Safety Climate How can you measure .docx
makdul
 
answer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docxanswer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docx
YASHU40
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
Osama Salah
 
Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering
Dr. SELVAGANESAN S
 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
gilbertkpeters11344
 
Incident Response
Incident ResponseIncident Response
Incident Response
MichaelRodriguesdosS1
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docx
bagotjesusa
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
PoornachanranKV
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
nathan816428
 
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docxThe Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
intel-writers.com
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
John Intindolo
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
April Dillard
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
Luke Farrell
 
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docxSOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
rronald3
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
Vskills
 
Security risk
Security riskSecurity risk
Security risk
Randy Tamoria
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Shola Yemi-Jonathan
 
cybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdfcybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdf
CecilSu
 

Similar to Adversarial Safety Analysis (20)

Threats vs. Vulnerabilities
Threats vs. Vulnerabilities Threats vs. Vulnerabilities
Threats vs. Vulnerabilities
 
Questions for the article ----Safety Climate How can you measure .docx
Questions for the article ----Safety Climate How can you measure .docxQuestions for the article ----Safety Climate How can you measure .docx
Questions for the article ----Safety Climate How can you measure .docx
 
answer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docxanswer original forum with a minimum of 500 words and respond to bot.docx
answer original forum with a minimum of 500 words and respond to bot.docx
 
Introduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information RiskIntroduction to FAIR - Factor Analysis of Information Risk
Introduction to FAIR - Factor Analysis of Information Risk
 
Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering Unit IV GE8076 Professional Ethics in Engineering
Unit IV GE8076 Professional Ethics in Engineering
 
4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx4A Prevention SystemOverviewDefining the Overall Se.docx
4A Prevention SystemOverviewDefining the Overall Se.docx
 
Incident Response
Incident ResponseIncident Response
Incident Response
 
Introductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docxIntroductory Physics Electrostatics Practice Problems Spring S.docx
Introductory Physics Electrostatics Practice Problems Spring S.docx
 
unit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineeringunit4.pptx professional ethics in engineering
unit4.pptx professional ethics in engineering
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docxThe Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
The Risk Analysis and Security Countermeasure Selection updated 2023 doc 11.docx
 
ISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_IntindoloISSC422_Project_Paper_John_Intindolo
ISSC422_Project_Paper_John_Intindolo
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docxSOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
SOCW 6520 WK 3 peer responses Respond to the blog post of th.docx
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Security risk
Security riskSecurity risk
Security risk
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...Demystifying the concepts of hazard avoidance in a dynamic work environment -...
Demystifying the concepts of hazard avoidance in a dynamic work environment -...
 
cybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdfcybersecurity-series-2019-threat-hunting.pdf
cybersecurity-series-2019-threat-hunting.pdf
 

More from Roger Johnston

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
Roger Johnston
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
Roger Johnston
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
Roger Johnston
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
Roger Johnston
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
Roger Johnston
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
Roger Johnston
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
Roger Johnston
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
Roger Johnston
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
Roger Johnston
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
Roger Johnston
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
Roger Johnston
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
Roger Johnston
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
Roger Johnston
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
Roger Johnston
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
Roger Johnston
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
Roger Johnston
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
Roger Johnston
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
Roger Johnston
 
How to Remove Voter's Ink
How to Remove Voter's Ink How to Remove Voter's Ink
How to Remove Voter's Ink
Roger Johnston
 
Common Security Reasoning Errors
Common Security Reasoning ErrorsCommon Security Reasoning Errors
Common Security Reasoning Errors
Roger Johnston
 

More from Roger Johnston (20)

In Risu Veritas: Humor & Security
In Risu Veritas: Humor & SecurityIn Risu Veritas: Humor & Security
In Risu Veritas: Humor & Security
 
Journal of Physical Security 15(1)
Journal of Physical Security 15(1)Journal of Physical Security 15(1)
Journal of Physical Security 15(1)
 
Security Audits.pdf
Security Audits.pdfSecurity Audits.pdf
Security Audits.pdf
 
Camera Obscura and Security/Privacy
Camera Obscura and Security/PrivacyCamera Obscura and Security/Privacy
Camera Obscura and Security/Privacy
 
Vulnerability Assessment: The Missing Manual for the Missing Link
Vulnerability Assessment:  The Missing Manual for the Missing Link  Vulnerability Assessment:  The Missing Manual for the Missing Link
Vulnerability Assessment: The Missing Manual for the Missing Link
 
Journal of Physical Security 14(1)
Journal of Physical Security 14(1)Journal of Physical Security 14(1)
Journal of Physical Security 14(1)
 
Want seals with that?
Want seals with that?Want seals with that?
Want seals with that?
 
Journal of Physical Security 13(1)
Journal of Physical Security 13(1)Journal of Physical Security 13(1)
Journal of Physical Security 13(1)
 
Election Security 2020
Election Security 2020Election Security 2020
Election Security 2020
 
A New Approach to Vulnerability Assessment
A New Approach to Vulnerability AssessmentA New Approach to Vulnerability Assessment
A New Approach to Vulnerability Assessment
 
Understanding Vulnerability Assessments
Understanding Vulnerability AssessmentsUnderstanding Vulnerability Assessments
Understanding Vulnerability Assessments
 
Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms Devil's Dictionary of Security Terms
Devil's Dictionary of Security Terms
 
Vulnerability Assessments
Vulnerability Assessments  Vulnerability Assessments
Vulnerability Assessments
 
Journal of Physical Security 12(3)
Journal of Physical Security 12(3)Journal of Physical Security 12(3)
Journal of Physical Security 12(3)
 
Journal of Physical Security 12(2)
Journal of Physical Security 12(2)Journal of Physical Security 12(2)
Journal of Physical Security 12(2)
 
Unconventional Security Devices
Unconventional Security DevicesUnconventional Security Devices
Unconventional Security Devices
 
Journal of Physical Security 11(1)
Journal of Physical Security 11(1)Journal of Physical Security 11(1)
Journal of Physical Security 11(1)
 
Journal of Physical Security 10(1)
Journal of Physical Security 10(1)Journal of Physical Security 10(1)
Journal of Physical Security 10(1)
 
How to Remove Voter's Ink
How to Remove Voter's Ink How to Remove Voter's Ink
How to Remove Voter's Ink
 
Common Security Reasoning Errors
Common Security Reasoning ErrorsCommon Security Reasoning Errors
Common Security Reasoning Errors
 

Recently uploaded

12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
Pierre E. NEIS
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
William (Bill) H. Bender, FCSI
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
Ram V Chary
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
Ahmed AbdelMoneim
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
Alexey Krivitsky
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
GanpatiKumarChoudhar
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
Bill641377
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
tdt5v4b
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
tdt5v4b
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
Anjana Josie
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
Jim Smith
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
tdt5v4b
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
strikingabalance
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
RoopaTemkar
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
Rob Healy
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
Pinta Partners
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
bernanbumatay1
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
tdt5v4b
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
Muhammad Adil Jamil
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve12 steps to transform your organization into the agile org you deserve
12 steps to transform your organization into the agile org you deserve
 
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
W.H.Bender Quote 66 - ServPoints Sequence of Service™ should be Identified fo...
 
Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...Integrity in leadership builds trust by ensuring consistency between words an...
Integrity in leadership builds trust by ensuring consistency between words an...
 
The Management Guide: From Projects to Portfolio
The Management Guide: From Projects to PortfolioThe Management Guide: From Projects to Portfolio
The Management Guide: From Projects to Portfolio
 
Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™Strategic Org Design with Org Topologies™
Strategic Org Design with Org Topologies™
 
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptxGanpati Kumar Choudhary Indian Ethos PPT.pptx
Ganpati Kumar Choudhary Indian Ethos PPT.pptx
 
Addiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdfAddiction to Winning Across Diverse Populations.pdf
Addiction to Winning Across Diverse Populations.pdf
 
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
原版制作(澳洲WSU毕业证书)西悉尼大学毕业证文凭证书一模一样
 
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
在线办理(Murdoch毕业证书)莫道克大学毕业证电子版成绩单一模一样
 
Sethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and LeadershipSethurathnam Ravi: A Legacy in Finance and Leadership
Sethurathnam Ravi: A Legacy in Finance and Leadership
 
Senior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdfSenior Project and Engineering Leader Jim Smith.pdf
Senior Project and Engineering Leader Jim Smith.pdf
 
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
原版制作(CDU毕业证书)查尔斯达尔文大学毕业证PDF成绩单一模一样
 
Enriching engagement with ethical review processes
Enriching engagement with ethical review processesEnriching engagement with ethical review processes
Enriching engagement with ethical review processes
 
Employment Practices Regulation and Multinational Corporations
Employment PracticesRegulation and Multinational CorporationsEmployment PracticesRegulation and Multinational Corporations
Employment Practices Regulation and Multinational Corporations
 
Comparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile SystemsComparing Stability and Sustainability in Agile Systems
Comparing Stability and Sustainability in Agile Systems
 
Public Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdfPublic Speaking Tips to Help You Be A Strong Leader.pdf
Public Speaking Tips to Help You Be A Strong Leader.pdf
 
Risk-Management-presentation for cooperatives
Risk-Management-presentation for cooperativesRisk-Management-presentation for cooperatives
Risk-Management-presentation for cooperatives
 
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
在线办理(UVic毕业证书)维多利亚大学毕业证录取通知书一模一样
 
Leadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact PlanLeadership Ethics and Change, Purpose to Impact Plan
Leadership Ethics and Change, Purpose to Impact Plan
 
20240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 202420240608 QFM019 Engineering Leadership Reading List May 2024
20240608 QFM019 Engineering Leadership Reading List May 2024
 

Adversarial Safety Analysis

  • 1. LAUR-04-0385 Journal of Safety Research 35, 245-248 (2004) Adversarial Safety Analysis: Borrowing the Methods of Security Vulnerability Assessments Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Los Alamos National Laboratory MS J565, Los Alamos, NM 87545 USA phone: 505-667-7414 fax: 505-665-4631 email: rogerj@lanl.gov Abstract Introduction: Safety and security share numerous attributes. The author, who heads the (Security) Vulnerability Assessment Team at Los Alamos National Laboratory, therefore argues that techniques used to optimize security might be useful for optimizing safety. Optimizing Security: There are 3 main ways to attempt to improve security—security surveys, risk assessment (or “design basis threat”), and vulnerability assessments. The latter is usually the most effective. Safety Analogs: Vulnerability assessment techniques used to improve security can be applied to safety analysis—even though safety is not ordinarily viewed as having malicious adversaries (other than hazards involving deliberate sabotage). Thinking like a malicious adversary can nevertheless have benefits in identifying safety vulnerabilities. Suggestions: The attributes of an effective safety vulnerability assessment are discussed, and recommendations are offered for how such an adversarial assessment might work. Conclusion: A safety vulnerability assessment can potentially provide new insights, a fresh and vivid perspective on safety hazards, and increased safety awareness. keywords: vulnerability assessment, risk assessment, security, psychology of safety, safety evaluations 1
  • 2. Biographical Sketch: Roger G. Johnston, Ph.D., CPP is Team Leader for the Advanced Diagnostics and Instrumentation Group in the Chemistry Division at Los Alamos National Laboratory (LANL). He also heads the LANL Vulnerability Assessment Team (VAT). The VAT has provided consulting, vulnerability assessments, and physical security solutions for over two dozen different government agencies and private companies. Johnston received his undergraduate degree from Carleton College in 1977, M.S. and Ph.D. degrees in physics from the University of Colorado in 1983, and his Certified Protection Professional (CPP) certification from the American Society for Industrial Security (ASIS) in 1997. His research interests include tamper & intrusion detection, cargo security, and nuclear safeguards. He is the Editor of the Journal of Physical Security. 2
  • 3. Introduction Safety and security have a lot in common. They both deal with probabilities and risk, and are both intrinsically preventative in focus. Both need to be dealt with in a proactive manner, but both often end up (in the real world) being handled reactively—typically with considerable finger-pointing, retaliation, recrimination, and hysteria after incidents occur, especially in large organizations. Both safety and security are often viewed by employees as impediments to productivity. Both can be seriously hampered by unimaginative managers, reluctant employees, poor communication, organizational inertia, and excessive bureaucracy. Optimizing either safety or security requires dealing with complex cost/benefit analyses, subtle matters of human and organizational psychology, and difficult issues of how to set priorities. Poor implementation of either safety or security measures can seriously impact an organization’s productivity, its economics and reputation, and the well-being and morale of its employees. We have conducted a large number of analyses of physical security in the Vulnerability Assessment Team at Los Alamos National Laboratory (LANL, 2003). This paper raises the question of whether the type of adversarial analysis we use for security vulnerability assessments might be useful for analyzing safety vulnerabilities. The underlying idea is that sometimes techniques borrowed from one field can be useful in another field, especially if it has similar attributes. Optimizing Security In the field of security, there are traditionally 3 ways to improve security: 1. Security Survey (Broder, 1999). This is a type of walk-around exercise. The security manager wanders the spaces and looks for problems, often with a checklist in hand. Security surveys are useful because they catch obvious mistakes, such as a hole in the fence, an unlocked door, or a guard asleep at his/her station. Security surveys, however, do not usually result in profound security improvements because they do not encourage creative thinking. 2. Risk Assessment, sometimes called “Design Basis Threat” (Garcia, 2001; Roper, 1999). In simplistic terms, this involves security managers thinking about the bad things that could happen, and then considering what they will do to mitigate those risks. Likelihood and Consequences are considered, and Vulnerabilities are given relative priorities. This is a useful approach for security but it often fails to result in dramatic security improvements. Why is this? In my experience, it is because the security people doing the analysis are often unimaginative. They tend to focus only on past security incidents, ignoring changing circumstances and unfamiliar rare-event risks that may be far more dangerous. More serious, however, is the fact that they usually have entirely the wrong mindset. The security risk assessors are thinking about things from the perspective of the "good guys", i.e., people who desperately do not want there to be security problems. As a result—human nature being what it is—security risk assessors often see what they want to see (that everything is secure), not necessarily what they need to see. 3
  • 4. 3. Vulnerability Assessment (Johnston and Garcia, 2003). In a security vulnerability assessment, unlike the above techniques, we quit being the good guys and pretend to be the bad guys. This requires a significant mental coordinate transformation. We try to get into the heads of the bad guys, think like them, and eagerly look for security weaknesses and vulnerabilities to exploit. We actually want to be troublemakers in our assessments, unlike the non-evil (but unimaginative) security managers typically involved in security surveys and risk assessments. Because we want to find problems, we do. Safety Analogs In the field of safety, security techniques 1 and 2 above have obvious analogs. The standard safety “walkaround” is similar to the security survey (#1). “What if?” safety exercises, or more formal safety risk assessments are like #2. On the surface, however, there wouldn’t appear to be a good match for #3 (vulnerability assessments) because there usually isn’t a nefarious adversary for safety —ignoring deliberate sabotage. [Deliberate sabotage is more properly thought of as a security issue rather than a safety matter. It is likely that most organizations underestimate or even ignore the insider security threat (Johnston and Bremer Maerli, 2003).] It may nevertheless be possible to have an adversarial vulnerability assessment for safety. The trick is to quit thinking like people who don't want there to be safety incidents, and start thinking like people (the “bad guys”) who wish for injuries, death, environmental harm, and damage to the organization. With that mindset, new safety hazards may suddenly become apparent—or at least we can think about safety from a fresh perspective. Another potential advantage, at least initially, to this kind of backwards thinking about safety is the novelty and shock value. This approach stands in stark contrast to the standard, insipid “think safety” slogans used in most organizations. Many organizations also encourage employees to think about “what if?” hazard scenarios. But it is psychologically quite different to mentally strive for non-safety, to enthusiastically envision scenarios involving injury or death for ourselves or co-workers. This is a much more proactive, dynamic, vivid, and personal approach to thinking about safety vulnerabilities than waiting around for “what if?” questions to randomly pop into one’s head. Moreover, as suggested in the Introduction, safety incidents often generate considerable political and career damage to individual employees, supervisors, and managers. The motivation for our imaginary evil bad guys might also include the desire to see a much admired and respected co-worker, supervisor, or manager get in career trouble as a result of a safety incident. An additional reason that this type of adversarial safety analysis may have psychological value to an organization is that the existence of “bad guys”—even if imaginary—can help to unify employees behind safety. Nothing unites people like a common enemy, even if imaginary. 4
  • 5. Suggestions for Conducting an Adversarial Safety Vulnerability Assessment An adversarial safety vulnerability assessment should involve first understanding the operations, facilities, and employees that are being assessed. The next step is to identify potential safety vulnerabilities through brainstorming and analysis. This is followed by evaluating and prioritizing the potential vulnerabilities. Finally, we devise practical countermeasures to the safety vulnerabilities. This process requires having the proper assessment personnel. Outsiders will often be useful since they may have fewer conflicts of interest. [One of the reasons that security risk assessments are often unsuccessful is that the people conducting the assessment are the same ones providing the security services, and thus don’t want there to be security problems. After all, their egos, reputations, and performance appraisals are on the line (Johnston and Garcia, 2003).] On the other hand, outsiders may have a poor understanding of the realities and unique characteristics of a given organization. In many cases, it might be prudent to form a safety vulnerability assessment team consisting of both insiders and outsiders. The insiders must include some of the people conducting the operations being evaluated. The best assessment personnel will be clever, creative, hands-on people with a history of thinking outside the box. Troublemakers, loophole finders, rule benders, smart alecks, renegades, and hackers—the very people that should make us nervous in regards to daily safety (or security) concerns—are exactly the types of individuals that should be part of the adversarial assessment team. They will instinctively be able to spot hazards and potential mischief that other, less jaded individuals miss. In many cases, it will not be practical to assemble a formal adversarial vulnerability assessment team. Instead, regular employees can be asked to assess their own working environment, but to do so as “bad guys”. In getting employees to think like “bad guys”, organizations should exploit the existence of any readily identifiable adversaries, such as a competing company or a troublesome governmental auditing agency. Employees may find it much easier to think like bad guys if they picture themselves as being these “villains”. Employees engaged in adversarial safety vulnerability assessments must never be subject to retaliation (or fear that they might) for finding potential safety problems. “Shooting the messenger” is a common problem for security vulnerability assessors (Johnston and Garcia, 2003); it must be avoided for safety assessments. For an adversarial safety vulnerability assessment, we probably do not want to consider deliberate sabotage by employees or outsiders. Sabotage is more appropriately thought of as a security issue, rather than a safety concern. Thus, one employee deliberately hitting another over the head with a 5
  • 6. pipe wrench (for example) is not a safety scenario that needs to be considered in this type of assessment. Deliberately tampering with equipment is another act of sabotage that is more of a security issue than a safety one. In most cases, safety incidents caused by a single mistake or failure should be considered first, followed by more complex scenarios that require multiple contingencies. Note that in a security vulnerability assessment, the assessors attempt to envision (or even demonstrate) concrete actions that bad guys can take in order to accomplish their nefarious objectives. The bad guys in the proposed safety adversarial analysis, however, are more passive (because we are leaving out deliberate sabotage), though just as malevolent. They are nefarious observers who fervently hope for safety incidents to occur, for employees to get hurt or killed, and for employees, managers, and supervisors to get in trouble as a result. The “bad guy” assessors should gleefully attempt to identify possible ways these things might happen, but they do not picture themselves actually taking deliberate actions to make safety incidents occur. That falls into the category of sabotage. It is particularly important not to misunderstand the word “adversarial”. It is one thing for safety assessors to think like “bad guys” as part of a mental construct to assist in discovering safety vulnerabilities. It is quite another matter for those same safety assessors to behave in a belligerent manner, or to use the safety assessment process (or its resulting recommendations) as a weapon. Attempts to unnecessarily stop or interfere with work, threaten and harass employees, institute useless paperwork and bureaucracy, waste resources, or otherwise harm the organization are acts of sabotage, not safety optimization. Effective brainstorming is critical. The vulnerability assessors need to be encouraged to think creatively, even recklessly, and to have fun with their “villainous” analysis. Assessors must feel free to offer ideas (at least initially) without objections, criticisms, or value judgments from other team members. It should be permissible to consider safety incidents that involve, for example, flying monkeys, Elvis impersonators, or space aliens; doing so encourages unconventional thinking. Only at a later stage, when brainstorming is largely complete, will the possible scenarios need to be critically evaluated, then either dismissed or else modified into something more probable. It is essential throughout the process to maintain enthusiasm for finding mechanisms that can cause injury, death, trouble, destruction, and chaos. The goal is to think evil, not think safety. Success means finding ways for safety to fail, not seeking to be reassured that everything is fine. Indeed, an adversarial safety assessment that finds no new safety vulnerabilities is a waste of time. Safety vulnerabilities always exist. Finding none simply means that the process has failed and should be redone correctly, ideally with different personnel who will do the job more competently. 6
  • 7. Assessors should be sure to consider the psychological status of employees in evaluating safety vulnerabilities. Neither safety nor security will be optimal under conditions involving high stress levels, widespread disgruntlement, and/or low employee morale (Johnston and Maerli, 2003). The adversarial safety vulnerability assessment considered here requires a certain glib suspension of the traditional, serious way that safety is usually considered. If managers are not careful, however, this could be misinterpreted by employees. Employees need to be convinced that the organization really does take safety seriously, and does not want employees to get hurt or employees to get in trouble over safety incidents. It must be made clear that the adversarial safety assessment is a kind of role-playing exercise (or tool) for putting people in a dramatically different mental framework in hopes of gaining fresh insights into safety hazards. Conclusion This paper presents what may be an unconventional way to think about and to analyze safety. It borrows from proven techniques for conducting effective security vulnerability assessments based on thinking like a malicious adversary. While security is all about neutralizing adversaries, safety is not usually thought of in those terms. Nevertheless, it can be argued that there may be some benefit to thinking of safety from the perspective of a malevolent observer. If nothing else, rooting for injuries, death, damage, and general mayhem provides a novel, even shocking way to think about safety that has the potential for bringing fresh insight and enhanced safety awareness. It may also help employees to rally around safety by anthropomorphizing safety hazards in the persona of the “bad guys”. Acknowledgment and Disclaimer Janie Enter provided useful comments. The views expressed in this paper are those of the author and should not necessarily be ascribed to Los Alamos National Laboratory or the United States Department of Energy. 7
  • 8. References Broder, J. (1999). Risk analysis and the security survey. Boston, MA: Butterworth-Heinemann. Garcia, M.L. (2001). The design and evaluation of physical protection systems. Boston, MA: Butterworth-Heinemann. Johnston, R.G. and Bremer Maerli, M. (2003). The negative consequences of ambiguous ‘safeguards’ terminology. Proceedings of the Institute for Nuclear Materials Management (INMM) 44th Annual Meeting, July 13-17, Phoenix, AZ. Johnston, R.G. and Garcia, A.R.E. (2003). Effective vulnerability assessments for physical security devices, systems, and programs. Österreich Militärische ZeitSchrift (Austrian Military Journal), Special Edition on Nuclear Material Protection, February 2003, 51-55. LANL Vulnerability Assessment Team. (2003). VAT Home Page: http://pearl1.lanl.gov/seals/default.htm. Roper C. (1999). Risk assessment for security professionals. Boston, MA: Butterworth- Heinemann. 8