Assessing the security vulnerabilities of correctional facilities

被引:0
|
作者
Spencer, DS [1 ]
Morrison, GS [1 ]
机构
[1] Sandia Natl Labs, Albuquerque, NM 87185 USA
来源
ENFORCEMENT AND SECURITY TECHNOLOGIES | 1998年 / 3575卷
关键词
vulnerability assessment; correctional facility; detection; security;
D O I
10.1117/12.334984
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identify the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion from outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees. In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.
引用
收藏
页码:156 / 163
页数:8
相关论文
共 50 条
  • [31] A Large-Scale Study of IoT Security Weaknesses and Vulnerabilities in the Wild
    Selvaraj, Madhu
    Uddin, Gias
    ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2025, 34 (02)
  • [32] Vehicle Security: A Survey of Security Issues and Vulnerabilities, Malware Attacks and Defenses
    Abu Elkhail, Abdulrahman
    Refat, Rafi Ud Daula
    Habre, Ricardo
    Hafeez, Azeem
    Bacha, Anys
    Malik, Hafiz
    IEEE ACCESS, 2021, 9 : 162401 - 162437
  • [33] Availability Assessment of Embedded Systems with Security Vulnerabilities
    Kornecki, Andrew J.
    Zalewski, Janusz
    Stevenson, Wendy F.
    2011 34TH IEEE SOFTWARE ENGINEERING WORKSHOP (SEW 2011), 2011, : 42 - 47
  • [34] Security Vulnerabilities and Countermeasures of Smart Contracts: A Survey
    Sifra, Epherem Merete
    2022 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2022), 2022, : 512 - 515
  • [35] Security of the Internet of Things: Vulnerabilities, Attacks, and Countermeasures
    Butun, Ismail
    Osterberg, Patrik
    Song, Houbing
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2020, 22 (01): : 616 - 644
  • [36] Security Issues and Vulnerabilities in Connected Car Systems
    Becsi, Tamas
    Aradi, Szilard
    Gaspar, Peter
    2015 INTERNATIONAL CONFERENCE ON MODELS AND TECHNOLOGIES FOR INTELLIGENT TRANSPORTATION SYSTEMS (MT-ITS), 2015, : 477 - 482
  • [37] Mitigating Program Security Vulnerabilities: Approaches and Challenges
    Shahriar, Hossain
    Zulkernine, Mohammad
    ACM COMPUTING SURVEYS, 2012, 44 (03)
  • [38] An Overview of the EMV Protocol and Its Security Vulnerabilities
    El Madhoun, Nour
    Bertin, Emmanuel
    Pujolle, Guy
    PROCEEDINGS OF THE 2018 FOURTH INTERNATIONAL CONFERENCE ON MOBILE AND SECURE SERVICES (MOBISECSERV), 2018,
  • [39] Analysing Requirements to Detect Latent Security Vulnerabilities
    Busby-Earle, Curtis C. R.
    France, Robert B.
    Ray, Indrakshi
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 168 - 175
  • [40] Analysis of Field Data on Web Security Vulnerabilities
    Fonseca, Jose
    Seixas, Nuno
    Vieira, Marco
    Madeira, Henrique
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2014, 11 (02) : 89 - 100