Professional Documents
Culture Documents
Modeling Decision Analysis and Risk Management Presented at Bioterrorism Threat Assessment and Risk Management Workshop
Modeling Decision Analysis and Risk Management Presented at Bioterrorism Threat Assessment and Risk Management Workshop
Modeling Decision Analysis and Risk Management Presented at Bioterrorism Threat Assessment and Risk Management Workshop
Risk Management
Presented at
Bioterrorism Threat Assessment and
Risk Management Workshop
Bryan S. Ware
November 12, 2001
Overview
Demographic
Org Intent Likelihood
Models and Attack
Simulations History
RIN Fragment
Distance to Accessible
Perimeter Susceptibility Consequence
Historical
Databases LOS to Asset Recognizable
Damage TARGET
Y-Axis
• Risk Management
– Deny threats
– Protect assets
– Control
consequences
Site Profiler® Customization
Historical Data
Tail
ts
ored
n
r
k tio t
epo
is n
U r fa e
R liza me
In ng
se c
te in
Use
mR
ua ron
r e
E
s
Vi nvi
r Int
to
E
Cus
Object
erfa
Database
ce
rt or
A ng
o
n a in
t
ep ra
E
Plug-in
ly e
R ne
tic
e
G
Interface Bu
s els
in d
es
sR e Mo
iv
ul
es i ct
ed
Pr
Notional Tool Layout
Assessment Tools
Analysis Tools
Example Implementation
HQ
• Policy
• Standards
Region
Region • Strategic Resource
Region Allocation
• Budgeting
• Assessment
Site 1 Site 2 Site 3
… Site n • Planning
• Resource
Allocation
Vulnerability
VA Team
Assessment
Solution Engineering
Differentiators
Building Object
Structure
Physical
World
Model World Model
Asset
Domain objects require programming for
customization, but World objects can be
created easily through database updates.
Domain Threats are composed of a Terrorist
Model and a Weapon System. The Threat
Threat Domain Object composes a threat
(Truck Bomb) from World Model objects. JVAT
supports 15 types of Threats with
Weapon hundreds of weapon system
Terrorist
System
configurations.
Delivery
Weapon
System
Threat
Vehicle Bomb Truck TNT
Terrorist
Attack
Terrorist Land
Org. (foe) Weapon
Attack Vehicle
World World
Model
Threat
Asset Threat
Target
Attack
Threat Vector
Random
Gate
Inspection
Military Police Guard Guard
ID check Barrier
Building Asset
Attributes:
• Asset Type
• Labeling
• Population
• Mission Role
• Ease of Access.
• Prox. To assets
• Recognizability
• Symbolic
Domain and Object Model Creation
Building Asset
Attributes:
• Asset Type
• Labeling
• Population
Desirability
• Mission Role Asset Type
Attack History
• Prox. To assets
other Assets
Population
Press
Demography
• Recognizability Demograph X
Asset Type Architecture
• Symbolic
is present
Labeling
Time sensitivity
Mission Role of Mission
Recoverability
Building Object
Attributes:
• Number of stories
• Percentage of glass
• Frame construction
• Panel type
• Glass type
• Underground parking
garage
High-Level RIN
Accessibility
Susceptibility
Recognizability
Asset Threat
Practicality
Target
Attractiveness
Desirability
Target
Mission Effect
Risk
Intangible
Consequences
Legend Effect
Casualties
Asset
Plausible
Weapon
Target
Plausible Threat
Tactic Likelihood
Threat
Organizational
Intent
Risk Influence Network (RIN)
• Domain objects contain the attributes that influence
the risk of a given event
• These attributes are represented by probability
distributions
• These attributes combine to form a Bayesian belief
network representation of domain knowledge
• This RIN can be solved hierarchically…as more data
becomes available, more of the network nodes are
used for calculation
• The network is broken into fragments that are tied to
Domain Objects and supported by World Objects
Bayesian Network Basics
a1 a2 a3
Parameter of Interest,
also called a “Node” A 0.3 0.5 0.2
Arrow indicates a
casual influence, b1 b2 b3
arrow tip indicates
a1 0.8 0.15 0.05
direction of influence B
(A influences B) 0.2 0.6 0.2
a2
Interface Language)
XUL (XML User
- Reads Polices - Sends Objects
User Interface
ODMG 3.0
HTML
Manager Database
Presentation Descriptions Workflow
Server Server
- Presennts Screen
representation info Object
User Interface - Presents Workflow
based on user type Information
Events
Surveyor PALM
Presentation
XOL (XML Object
Server Processed
Translation
Language)
Site Profiler
Site Profiler
Computational Report
Application 3D Runtime GUI Engine Persistent Objects Plugin Interface
Engine Generator
Component
Interface
Open GL Custom API ODBC ADO/OLE DB Custom Interfaces
Standard
Interface
API COM
Mechanism
CM Standards,
Asset Analysis Intelligence Vulnerability Risk Prioritization Risk Reduction Cost
Standards Standards Standards Standards Standards Standards
Define Define Analyze Target Analyze Analyze Risk Prioritized Cost / Risk Reduction
Assets + Prioritized Risks +
Assets Assets Threats Vulnerability Pairings + Risk Reduction Benefit Plan + CM
Threats Risks CM
CMs Measures Upgrades Analysis Requests
ASSET
INFRA- OTHER
BUILDINGS PEOPLE AREAS MATERIAL
STRUCTURE
ASSETS
Target Model
A Target is the
association of
one or more
assets and zero
or more threats.
Threat_Target_Pair 1+
THREAT ASSET
TARGET
High Level Threat Model
THREAT
ID
Desc
Name
Active Y/N
AGENT
WEAPON
SYSTEM
DELIVERY
SYSTEM
WEAPON
Countermeasures
COUNTER-
MEASURE
COUNTER- Countermeasure_effectiveness
THREAT
MEASURE
EFFECTIVENESS
Denial Effectiveness
Deterrence Effectivness
Delay Effectiveness
Detection Effectiveness
Mitigation Effectiveness
Interruption Effectiveness
Response Effectiveness
Operation:
High Level World Model
Space
Land Vehicle Air vehicle Water craft Sensor Barrier
vehicle
PHYSICAL
AGENT EVENT
SITE PROFILER