Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture
Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
- Research Organization:
- Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
- Sponsoring Organization:
- USDOE
- DOE Contract Number:
- AC05-76RL01830
- Assignee:
- Battelle Memorial Institute (Richland, WA)
- Patent Number(s):
- 9,092,631
- Application Number:
- 14/055,776
- OSTI ID:
- 1202321
- Resource Relation:
- Patent File Date: 2013 Oct 16
- Country of Publication:
- United States
- Language:
- English
Similar Records
Cyber / Physical Security Vulnerability Assessment Integration
Evaluation Report on "The Department's Unclassified Cyber Security Program"