U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Computer Sites: Assessing the Threat

NCJ Number
113308
Journal
Security Management Volume: 32 Issue: 7 Dated: (July 1988) Pages: 41-47,50-51
Author(s)
A Rozen; J Musacchio
Date Published
1988
Length
9 pages
Annotation
Threat and vulnerability assessment were conducted by a consulting firm to define a fully integrated security system of passive and active terrorist countermeasures needed to effectively protect the main national data processing facility of a large European bank.
Abstract
In these assessments, consideration was given to the types of terrorist attack possible and the likely targets of attacks. Also considered were the relationship among the various systems, components, and structures. These included the buildings, the main computers, all peripheral equipment, the data archives, and the employees. The vulnerability analysis considered the extent of loss of function for each target resulting from long-range and short-range attacks. As a result of these analyses a variety of countermeasures were recommended. Hardening through architectural and engineering measures included prevention of vehicular access by installing steps and the use of various barriers. Site access control measures included fencing, an indirect access road, and a security-oriented main entrance. Other measures included installation of laminated glass, strengthening the building's envelope, and installation of a secondary generator. These measures were combined with access control systems, alarm systems, intrusion detection surveillance systems, and security officers. In addition, a number of emergency and crisis management measures were suggested. 10 exhibits.