Abstract
Security and emergency response usually fail due to a failure to identify and mitigate vulnerabilities, rather than a failure to envision threats. Unfortunately, however, threats usually receive more attention than vulnerabilities. Design Basis Threat and layered security exacerbate the problem. There are a number of aspects of nuclear security that require considerably more attention to the vulnerabilities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnston RG (2010) Being vulnerable to the threat of confusing threats with vulnerabilities. J Phys Secur 4(2):30–34
Johnston RG, Warner JS (2013) Debunking vulnerability assessment myths. SecurityInfoWatch, August 6 & 13, 2013, Part 1: http://www.securityinfowatch.com/article/11078830/experts-discuss-commonly-held-misconceptions-about-vulnerability-assessments. Part 2: http://www.securityinfowatch.com/article/11108983/experts-discuss-the-characteristics-of-good-vulnerability-assessors
American Society of Civil Engineers (2007) The New Orleans Hurricane protection system. What went wrong and why? http://www.asce.org/uploadedfiles/publications/asce_news/2009/04_april/erpreport.pdf
Bunn M, Sagan SD (2014) A worst practices guide to insider threats: lessons from past mistakes. American Academy of Arts and Sciences. http://cisac.fsi.stanford.edu/sites/default/files/insiderThreats.pdf
SlashGear (2014) Target reportedly ignored credit card hack warnings, March 14, 2014. http://www.slashgear.com/target-reportedly-ignored-credit-card-hack-warnings-14320673/
Leonnig CD (2014) White House fence-jumper made it far deeper into building than previously known. Washington Post, September 29, 2014
Wikipedia, “White House Intruders”. http://en.wikipedia.org/wiki/White_House_intruders
Johnston R, Folk C, Warner J (2014) Fearing NORQ, and why doing so is bad for security. Homel Secur Today 11(4):39–41. http://www.nxtbook.com/nxtbooks/kmd/hst_20140607/#/40
Harford T (2014) How to see into the future. Financial Times, September 6, 2014. http://www.ft.com/cms/s/2/3950604a-33bc-11e4-ba62-00144feabdc0.html#axzz3GhgHv4aA
Wiltermuth SS (2011) Cheating more when the spoils are split. Organ Behav Hum Decis Process 115(2):157–168
Bitzer E (2006) Strategies for cutting turnover. Secur Manag 50(5):88–94
Johnston RG (2010) Changing security paradigms. J Phys Secur 4(2):35–47
Johnston RG (2005) The ‘Anti-Evidence’ approach to tamper-detection. Packag Transp Storage Secur Radioact Mater 16:135–143
Johnston RG, Warner JS (2012) How to choose and use seals. Army Sustain 44(4):54–58. http://www.almc.army.mil/alog/issues/JulAug12/browse.html
Acknowledgments and Disclaimer
The views expressed here are those of the author and should not necessarily be ascribed to Argonne National Laboratory or the United States Department of Energy. Jon Warner provided important ideas and expertise.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer Science+Business Media Dordrecht
About this paper
Cite this paper
Johnston, R.G. (2015). Focusing on the Threats to the Detriment of the Vulnerabilities: A Vulnerability Assessor’s Perspective. In: Apikyan, S., Diamond, D. (eds) Nuclear Terrorism and National Preparedness. NATO Science for Peace and Security Series B: Physics and Biophysics. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9891-4_14
Download citation
DOI: https://doi.org/10.1007/978-94-017-9891-4_14
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-017-9890-7
Online ISBN: 978-94-017-9891-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)