DOE's New Advanced & Simplified VA Technique

Year
1993
Author(s)
Ronald E. Timm - R.E. Timm & Associates, Inc.
Abstract
Experience indicates that most security systems are poorly designed and easily breached. The integrity of electronic security systems depends on the conceptual design philosophy, including a complete analysis of requirements and a thorough vulnerability assessment, prior to the selection, placement, and utilization of detection equipment.* Center for Continuing Engineering Education. U. of Wisconsin, Milwaukee. A new advanced vulnerability analysis model has been developed for use by security professionals who have comprehensive backgrounds in physical security. The model has been developed as an analytical tool to aid in the management, engineering design, analysis, tactical planning, and testing of security systems. It is comprised of elements that together combine to provide quantitative and qualitative evaluation of protection effectiveness. The Advanced Logic Prototype Heuristic Analysis (ALPHA1*) model is comprised of three basic parts: 1) an event tree logic diagram, 2) a heuristic rule base, and 3) a fuzzy set decision guide. These three parts when manipulated together, provide a top-down overview of a protection system that portrays the layers, balance, and gradation of the security system and its protection elements.