INSIDER THREAT VULNERABILITY ANALYSIS - WAIT UPDATE

Year
1985
Author(s)
L. A. Goldman - Science Applications International Corporation
J. W. James - Science Applications International Corporation
T.L. McDaniel - Science Applications Interntional Corp.
J.A. Stoddard - Science Applications Interntional Corp.
Abstract
A computer-based method for security system evaluation and improvement called Matrix Analysis for the Jjisider ^Threat (MAIT) was developed and reported on previously by Science Applications International Corporation (SAIC). MAIT is a sophisticated jnetnod.for the_analysis _o_f_ safeguards or security systems that determines if single or multiple insiders can covertly sabotage a facility or system or can covertly divert a resource that is present in the facility or system. The MAIT code was initially developed for application to theft from fuel cycle facilities. Historically, the assumed adversary has been a single individual or two colluding people. However, the method can handle a large number of colluders. Since the focus of the MAIT method is on people who work covertly, interest has generally centered on insiders or facility employees. The MAIT method provides a detailed, organized way to exhaustively examine the safeguards or security system against these covert threats. An evaluation of this broad scope is beyond the reasonable capability of an analyst working without computer assistance. The MAIT analysis is conducted by first manually collecting detailed facility design data and access and control information for each individual safeguard measure. With this information, the MAIT computer code synthesizes every possible situation and returns data to the analyst concerning those particular events that are not adequately protected. Recently, several modifications have been made to the code to add to its versatility. These include the combination of theft and sabotage versions, the ability to handle multiple sequenced targets, the ability to analyze changing conditions at a facvlity, and, finally, the ability to develop an event vulnerability figure, if desired.