Insider threat vulnerability analysis - MAIT update
A computer-based method for security system evaluation and improvement called Matrix Analysis for the Insider Threat (MAIT) was developed and reported on previously by Science Applications International Corporation (SAIC). MAIT is a sophisticated method for the analysis of safeguards or security systems that determines if single or multiple insiders can covertly sabotage a facility or system or can covertly divert a resource that is present in the facility or system. The MAIT code was initially developed for application to theft from fuel cycle facilities. The MAIT method provides a detailed, organized way to exhaustively examine the safeguards or security system against these covert threats. An evaluation of this broad scope is beyond the reasonable capability of an analyst working without computer assistance. The MAIT analysis is conducted by first manually collecting detailed facility design data and access and control information for each individual safeguard measure. With this information, the MAIT computer code synthesizes every possible situation and returns data to the analyst concerning those particular events that are not adequately projected.
- Research Organization:
- Science Applications International Corp., La Jolla, CA 92037
- OSTI ID:
- 5356040
- Report Number(s):
- CONF-850765-
- Journal Information:
- J. Nucl. Mater. Manage.; (United States), Journal Name: J. Nucl. Mater. Manage.; (United States) Vol. 14:3; ISSN NUMMB
- Country of Publication:
- United States
- Language:
- English
Similar Records
Safeguards Evaluation Method for evaluating vulnerability to insider threats
The Safeguards Evaluation Method for evaluating vulnerability to insider threats
Related Subjects
Inspection
& Accountability-- Technical Aspects
22 GENERAL STUDIES OF NUCLEAR REACTORS
220900* -- Nuclear Reactor Technology-- Reactor Safety
29 ENERGY PLANNING, POLICY, AND ECONOMY
290600 -- Energy Planning & Policy-- Nuclear Energy
98 NUCLEAR DISARMAMENT, SAFEGUARDS, AND PHYSICAL PROTECTION
ADVERSARIES
COMPUTER CODES
COMPUTERIZED SIMULATION
CONTROL SYSTEMS
DATA ANALYSIS
DESIGN
ENTRY CONTROL SYSTEMS
EVALUATION
M CODES
MODIFICATIONS
NUCLEAR FACILITIES
NUCLEAR POWER PLANTS
PERSONNEL
POWER PLANTS
REACTOR PROTECTION SYSTEMS
REACTOR SAFETY
REACTOR SAFETY EXPERIMENTS
REGULATIONS
SABOTAGE
SAFEGUARD REGULATIONS
SAFEGUARDS
SAFETY
SECURITY
SECURITY VIOLATIONS
SIMULATION
STRATEGIC POINTS
THERMAL POWER PLANTS
VIOLATIONS