×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • Theoretical justification of examination mechanisms using expert assessment methods to analyze the vulnerability of an important government facility

    The article discusses issues of theoretical substantiation of examination mechanisms using expert assessment methods to analyze the vulnerability of an important government facility. The article discusses the theoretical justification of the mechanisms of development examination for two cases. The first is taking into account the interest of experts in the results of the examination, when experts strive for a minimum discrepancy between their true assessment and the resulting expert assessment of the project. In the second case, they show interest in increasing their rating. For both cases, we define the objective functions of the experts and find the conditions for the existence of a Nash equilibrium situation.

    Keywords: comprehensive security, methods, models, security forces, violators, important government facilities, expert assessment methods, vulnerability analysis

  • Identify and rank threats at a critical government facility

    The article discusses the issues of identifying and ranking threats at an important government facility. The classification of threats by type is described. The article discusses the concepts of “design-based threats” and “the most dangerous variant of the violator’s actions” and their differences. An example of ranking threats and reducing their number to reduce the dimensionality of the vulnerability analysis problem is considered. An important government object is considered as an object in the example. Experts are tasked with ranking threats according to the level of potential losses for an important government facility if they are realized. In practice, the implementation of an accepted design threat may lead to lower potential losses than the most dangerous option for violators and, as a result, to lower requirements for the effectiveness of the physical protection system.

    Keywords: comprehensive security, methods, models, security forces, intruders, important government facilities, clashes between security forces and attacks, ranking of threats

  • Determination and ranking of the targets of the offender in an attack on an important state object

    The article deals with the issues of determining and ranking the goals of the offender in an attack on an important state facility. The general goals of violators in an attack on an important state object are described, as well as important state objects with distributed goals preferred by the violator are considered. The material provides a definition of the common goal from the position of important state facilities, where the immediate goals are the subjects of physical protection. The ranking of targets is determined taking into account the probability of their selection by violators and potential losses in case of success of unauthorized actions, which allows you to correctly determine both the concept of creating a physical protection system and technical solutions for its implementation. The article describes the methods of peer review, which are solved by representatives of an important state object with the participation and with the help of independent experts of a specialized organization, who analyze the vulnerability of the object as a whole.

    Keywords: integrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offenders' goals

  • Determination and ranking of the targets of the offender in an attack on an important state object

    The article deals with the formation of a violator model in an attack on an important state facility. The classification of violators by types is described. The article proposes the simplest model for evaluating the effectiveness of violators' collusion.

    Keywords: ntegrated security, methods, models, security forces, offenders, important state facilities, clashes between security and attack forces, offender models