A Proven Method for Identifying Security Gaps in International Postal and Transportation Critical Infrastructure

被引:0
|
作者
Allen, Julia H. [1 ]
Curtis, Pamela D. [1 ]
Mehravari, Nader [1 ]
Crabb, Gregory [2 ]
机构
[1] Carnegie Mellon Univ, Inst Software Engn, Pittsburgh, PA 15213 USA
[2] US Postal Inspect Serv, Washington, DC USA
基金
美国安德鲁·梅隆基金会;
关键词
Physical Security; Resilince Management;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The safety, security, and resilience of international postal, shipping, and transportation critical infrastructure are vital to the global supply chain that enables worldwide commerce and communications. But security on an international scale continues to fail in the face of new threats, such as the discovery by Panamanian authorities of suspected components of a surface-to-air missile system aboard a North Korean-flagged ship in July 2013 [1]. This reality calls for new and innovative approaches to critical infrastructure security. Owners and operators of critical postal, shipping, and transportation operations need new methods to identify, assess, and mitigate security risks and gaps in the most effective manner possible. The United States Postal Inspection Service (USPIS), in collaboration with the Universal Postal Union (UPU) and the CERT (R) Program at Carnegie Mellon University's Software Engineering Institute, developed a physical security assessment method to identify gaps in the security of international mail processing centers and similar shipping and transportation processing facilities. This assessment method and its associated field instrument are designed to be repeatable, cost effective, scalable, accurate, meaningful, and transparent. The USPIS has demonstrated these characteristics in using the field instrument in a variety of locations. Since the method uses UPU standards as its reference, it may be used by the international community to evaluate the security of postal administrations around the world. The method also can be applied to other types of critical transportation services, such as metropolitan transit systems. This paper describes the history, development approach, field experiences, and benefits of this method.
引用
收藏
页数:5
相关论文
共 14 条
  • [1] State-of-the-art" IT security: How critical infrastructure operators can plug their security gaps
    Koch A.
    BWK- Energie-Fachmagazin, 2023, 75 (1-2): : 17 - 18
  • [2] Using technology to bridge maritime security gaps - Identifying marine transportation vulnerabilities and countermeasures
    Ferriere, D
    Pysareva, K
    Rucinski, A
    SEA TECHNOLOGY, 2005, 46 (08) : 53 - +
  • [3] Critical infrastructure vulnerability-A method for identifying the infrastructure service failure interdependencies
    Seppanen, Hannes
    Luokkala, Pekka
    Zhang, Zhe
    Torkki, Paulus
    Virrantaus, Kirsi
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2018, 22 : 25 - 38
  • [4] COMPARISON OF CRITICAL TRANSPORTATION INFRASTRUCTURE OF FOOD SUPPLY IN HUNGARY AND GERMANY - IDENTIFYING KEY STAKEHOLDERS
    Freund, Anna
    Jambor, Zsofia
    Nagy, Judit
    BUSINESS LOGISTICS IN MODERN MANAGEMENT, 2023, 2023, : 173 - 192
  • [5] Simple method for identifying interdependencies in service delivery in critical infrastructure networks
    A. E. Schweikert
    G. F. L’Her
    M. R. Deinert
    Applied Network Science, 6
  • [6] Simple method for identifying interdependencies in service delivery in critical infrastructure networks
    Schweikert, A. E.
    L'Her, G. F.
    Deinert, M. R.
    APPLIED NETWORK SCIENCE, 2021, 6 (01)
  • [7] When Security Risk Assessment Meets Advanced Metering Infrastructure: Identifying the Appropriate Method
    Shokry, Mostafa
    Awad, Ali Ismail
    Abd-Ellah, Mahmoud Khaled
    Khalaf, Ashraf A. M.
    SUSTAINABILITY, 2023, 15 (12)
  • [8] A novel heuristic simulation-optimization method for critical infrastructure in smart transportation systems
    Kumar, Adarsh
    Rajalakshmi, Krishnamurthi
    Jain, Saurabh
    Nayyar, Anand
    Abouhawwash, Mohamed
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (11)
  • [9] Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
    Park, Soon-Tai
    Shin, Jong-Whoi
    Min, Bog-Ki
    Lee, Ik-Sub
    Lee, Gang-Shin
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 14, 2006, 14 : 37 - 40
  • [10] Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
    Yoo, Dong-Young
    Shin, Jong-Whoi
    Lee, Gang Shin
    Lee, Jae-Il
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 26, PARTS 1 AND 2, DECEMBER 2007, 2007, 26 : 639 - 643