Physical vulnerability assessment

Effective infrastructure (security) Vulnerability Assessments require creative and resourceful personnel, whichever methods are employed. It is essential for vulnerability assessors to try to assume the mind-set of the adversaries and to look at vulnerabilities, attacks, and possible countermeasures from their perspective. Unfortunately, a lot of what passes for Vulnerability Assessments is actually Threat Assessment or relatively mundane checking of compliance with formal security regulations and guidelines. It is often highly unimaginative. Brainstorming is a powerful tool for helping, and there are a number of tips for enhancing its effectiveness. Vulnerability assessors also need to be alert to common security mistakes found in many organizations. They must try to avoid the widespread myths about security vulnerabilities and the common Vulnerability Assessment mistakes that hamper analysis.

[1]  Eugene Raudsepp Managing creative scientists and engineers , 1963 .

[2]  John Fay,et al.  Encyclopedia of Security Management , 2007 .

[3]  R. Sternberg Handbook of Creativity: Subject Index , 1998 .

[4]  J. Crisp,et al.  The Delphi method? , 1997, Nursing research.

[5]  Murray Turoff,et al.  The Delphi Method: Techniques and Applications , 1976 .

[6]  Brian T. Bennett,et al.  Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel , 2007 .

[7]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .

[8]  Eugene Tucker,et al.  Risk Analysis and the Security Survey , 1999 .

[9]  Susan Snedakar Vulnerability Assessment Tools , 2007 .

[10]  R. Sternberg,et al.  The Cambridge handbook of creativity. , 2010 .

[11]  Michael Michalko,et al.  Cracking Creativity: The Secrets of Creative Genius , 1998 .

[12]  W E Vesely,et al.  Fault Tree Handbook , 1987 .

[13]  Mary Lynn Garcia,et al.  The Design and Evaluation of Physical Protection Systems , 2001 .

[14]  M. Runco Creativity: Theories and Themes: Research, Development, and Practice , 2006 .

[15]  Roger Von Oech,et al.  A Whack on the Side of the Head: How You Can Be More Creative , 1973 .

[16]  Johnny Long,et al.  No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing , 2008 .

[17]  Kim Kerr Cpp,et al.  Workplace Violence: Planning for Prevention and Response , 2010 .

[18]  William L. Simon,et al.  The Art of Deception , 2002 .

[19]  George Wright,et al.  The Delphi technique as a forecasting tool: issues and analysis , 1999 .