Ken Sochats/ Threat Potential Modeling

Slides:



Advertisements
Similar presentations
Disaster Management Civil-Military Coordination
Advertisements

Critical Infrastructure Protection Policy Priorities Sara Pinheiro European Commission DG Home Affairs.
Department of Homeland Security Site Assistance Visit (SAV)
Institutional Insurance: Creating a Comprehensive Campus-wide IT Security Risk Management Program Brian Davis IT Security & Policy Office of Information.
OCTAVESM Process 4 Create Threat Profiles
CIRAS PROJECT OVERVIEW
S3-1 © 2001 Carnegie Mellon University OCTAVE SM Process 3 Identify Staff Knowledge Software Engineering Institute Carnegie Mellon University Pittsburgh,
S2-1 © 2001 Carnegie Mellon University OCTAVE SM Process 2 Identify Operational Area Management Knowledge Software Engineering Institute Carnegie Mellon.
A Robust Process Model for Calculating Security ROI Ghazy Mahjub DePaul University M.S Software Engineering.
Risk and Economic Analysis of Terrorism Events Detlof von Winterfeldt Professor of Public Policy and Management Director, Center for Risk and Economic.
Center for Risk and Economic Analysis of Terrorism Events (CREATE) First Annual Conference November 18, 2004 Randolph W. Hall, University of Southern California.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Critical Infrastructure Protection (and Policy) H. Scott Matthews March 25, 2004.
Leslie W Kennedy Director RUTGERS Newark. Sponsored by the Rutgers School of Criminal Justice, Center for Global Change and Governance, College of Nursing.
Emergent Phenomena & Human Social Systems NIL KILICAY.
3rd Party Risk Categorization Process
Presenter : Zamarak. Agenda Overview Related Literature Process Deliverable Diagram An Example.
Application Threat Modeling Workshop
Visual 3. 1 Lesson 3 Risk Assessment and Risk Mitigation.
Maritime Security Risk Analysis Model
Cyber-Infrastructure for Agro-Threats Steve Goddard Computer Science & Engineering University of Nebraska-Lincoln.
ARTIFICIAL INTELLIGENCE IN HOMELAND SECURITY Patrick Hathaway CS572 – Advanced Artificial Intelligence.
WMD & Emergency Planning Steps Session 12. Emergency Planning Steps Vulnerability Assessment Mitigation Efforts Emergency Response Planning Recovery.
Assessing Global Political Risks. Types of Political risk Companies have to evaluate all the possible risks that could happen in the potential foreign.
1 st Seminar Session on Risk and Security Issues Center for Risk and Security The George Perkins Marsh Institute Conference Room May 13 th, 2005.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Directorate Update David W. Lightfoot Assistant Director National Science Foundation.
WORKSHOP Laredo 28 th May OBJECTIVES To provide an interactive forum to discuss the developments of Logistics Cities To share experiences – good,
Geosciences - Observations (Bob Wilhelmson) The geosciences in NSF’s world consists of atmospheric science, ocean science, and earth science Many of the.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Infrastructure Protection
Health Emergency Risk Management Pir Mohammad Paya MD, MPH,DCBHD Senior Technical Specialist Public Health in Emergencies Asian Disaster Preparedness Center.
2/28/02 NSF - Responding to the Unexpected 1 Earthquake Case Discussion Response to Unexpected NSF Workshop Feb 27-Mar
Visual 1. 1 Lesson 1 Overview and and Risk Management Terminology.
Alex Adamec.  Any physical or virtual information system that controls, processes, transmits, receives, or stores electronic information in any form.
Information Security Governance and Risk Chapter 2 Part 2 Pages 69 to 100.
GSFC Safety & Mission Assurance (SMA) Briefing for Goddard Contractor Association 7/2/15.
UNECE – SC2 Rail Security Analysis and economic assessment of rail transport security 1st October 2009 Andrew Cook.
Understanding the Potential of IT
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
Prepare + Prevent + Respond + Recover + Mitigate Preparedness Section Planning Branch 1.
Cyber Insurance Collecting and Storing Cyber attack data using a Cyber Security Surveillance System (CS3) Presenter: Kasturi Balakrishnan.
Risk Assessment What is good about the Microsoft approach to threat modeling? What is bad about it? OCTAVE…  Advantage: ___________  Disadvantage: ___________.
1 WMATA BACKUP OCC TPB BRIEFING May 18, 2005 Washington Metropolitan Area Transit Authority.
Title: Port Security Risk Assessment Tool (PSRAT) Author:Tony Regalbuto Chief, Office of International & Domestic Port Security Assessments United States.
OAS Secretariat for Multidimensional Security CICTE Secretariat Disasters and Critical Infrastructure Protection.
Homeland Security, First Edition © 2012 Pearson Education, Inc. All rights reserved. Overview of National Infrastructure Protection CHAPTER 3.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
ON “SOFTWARE ENGINEERING” SUBJECT TOPIC “RISK ANALYSIS AND MANAGEMENT” MASTER OF COMPUTER APPLICATION (5th Semester) Presented by: ANOOP GANGWAR SRMSCET,
The process of identifying and controlling the risks is called Risk Management.
SEC 470 OUTLET The learning interface/sec470outletdotcom.
SEC 470 Entire Course (UOP) For more course tutorials visit  SEC 470 Week 1 US Patriot Act Paper  SEC 470 Week 2 Federal Agencies.
CRITICAL INFRASTRUCTURE RISK ASSESSMENT SUPPORT CIRAS PROJECT OVERVIEW 2nd Stakeholders’ Workshop Aschaffenburg, November, 26th, 2015 Jaime Martín, Project.
Risks and Hazards to Consider Unit 3. Visual 3.1 Unit 3 Overview This unit describes:  The importance of identifying and analyzing possible hazards that.
Flood Modeling at the Mesoscale Level
Society for Maintenance and Reliability Professionals (SMRP)
Žilinská univerzita v Žiline Fakulta špeciálneho inžinierstva
13 Best 2014 Jobs
Critical Infrastructure Protection Policy Priorities
CSCE 548 Secure Software Development Test 1 Review
Mass Movement Hazards and Risk
Plan4Blue project work on cumulative impacts
Transit Security Training and Education Overview
The U.S. Department of Homeland Security
How to evaluate and predict the ecologic impact of antibiotics: the pharmaceutical industry view from research and development  R. Bax  Clinical Microbiology.
FY 2014 SHSP and UASI Risk Formula
Effective Risk Management in Decision Making Process
Integrated Environmental Assessment and Reporting Based on the Global Environment Outlook (GEO) Approach of UNEP László Pintér.
Concept Technical Approach Application Collaborations
Presentation transcript:

Ken Sochats/ Threat Potential Modeling 060704 Ken Sochats/ Threat Potential Modeling [Terrorism / Threat Modeling, Visual Information Systems Center, 412-624-9416, http://visc.sis.pitt.edu] Technical Approach In this system, every important "asset" in a region would be identified and geo-located. Each of these assets would be evaluated as to "value" and impact area. Evaluation algorithms “sum” the assessments into threat areas of varying potential. Modeling software predicts consequences, evacuation, response, etc. Application Collaborations This project aims to develop a geo-spatial system that assists security analysts and planners in assessing the risks to infrastructure elements as a result of terrorist attacks. The modeling approach handles fixed assets as well as events. Collocated, adjacent and dependent assets interact in security assessment Handles human, infrastructure and ecological elements. Visual Information Systems Center (VISC) University of Pittsburgh American Society of Mechanical Engineers (ASME)