Assessing the security vulnerabilities of correctional facilities

被引:0
|
作者
Spencer, DS [1 ]
Morrison, GS [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
来源
ENFORCEMENT AND SECURITY TECHNOLOGIES | 1998年 / 3575卷
关键词
vulnerability assessment; correctional facility; detection; security;
D O I
10.1117/12.334984
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
引用
收藏
页码:156 / 163
页数:8
相关论文
共 50 条
  • [1] Perimeter security for Minnesota correctional facilities
    Crist, D
    Spencer, DD
    SECURITY SYSTEMS AND NONLETHAL TECHNOLOGIES FOR LAW ENFORCEMENT, 1997, 2934 : 116 - 124
  • [2] Training Psychiatry Residents at Correctional Facilities
    Jha, Manish Kumar
    Fuehrlein, Brian S.
    North, Carol S.
    Brenner, Adam M.
    ACADEMIC PSYCHIATRY, 2015, 39 (01) : 123 - 124
  • [3] Training Psychiatry Residents at Correctional Facilities
    Manish Kumar Jha
    Brian S. Fuehrlein
    Carol S. North
    Adam M. Brenner
    Academic Psychiatry, 2015, 39 : 123 - 124
  • [4] Moodle Security Vulnerabilities
    Galan Hernandez, Juan Carlos
    Leon Chavez, Miguel Angel
    2008 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTING SCIENCE AND AUTOMATIC CONTROL (CCE 2008), 2008, : 199 - 204
  • [5] Android Vulnerabilities and Security
    Yadav, Saurav
    Apurva, Aviral
    Ranakoti, Pranshu
    Tomer, Shashank
    Roy, Nihar Ranjan
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 204 - 208
  • [6] Security Vulnerabilities in LoRaWAN
    Yang, Xueying
    Karampatzakis, Evgenios
    Doerr, Christian
    Kuipers, Fernando
    2018 IEEE/ACM THIRD INTERNATIONAL CONFERENCE ON INTERNET-OF-THINGS DESIGN AND IMPLEMENTATION (IOTDI 2020), 2018, : 129 - 140
  • [7] A Study of Android Security Vulnerabilities and Their Future Prospects
    Alsumayt, Albandari
    Elbeh, Heba
    Elkawkagy, Mohamed
    Alfawaer, Zeyad
    Alghamedy, Fatemah H.
    Alshammari, Majid
    Aljameel, Sumayh S.
    Albassam, Sarah
    Alghareeb, Shahad
    Alamoudi, Khadijah
    HighTech and Innovation Journal, 2024, 5 (03): : 854 - 869
  • [8] Detection of security vulnerabilities in C language applications
    Boudjema, El Habib
    Faure, Christele
    Sassolas, Mathieu
    Mokdad, Lynda
    SECURITY AND PRIVACY, 2018, 1 (01)
  • [9] The catch 22 of condoms in US correctional facilities
    Joseph D Tucker
    Suzanne W Chang
    Jacqueline P Tulsky
    BMC Public Health, 7
  • [10] Making the case for health interventions in correctional facilities
    Theodore M. Hammett
    Journal of Urban Health, 2001, 78 : 236 - 240