Published January 1, 1999
| Version v1
Conference paper
Open
Evaluating the risk of industrial espionage
Authors/Creators
Description
A methodology for estimating the relative probabilities of different compromise paths for protected information by insider and visitor intelligence collectors has been developed based on an event-tree analysis of the intelligence collection operation. The analyst identifies target information and ultimate users who might attempt to gain that information. The analyst then uses an event tree to develop a set of compromise paths. Probability models are developed for each of the compromise paths that user parameters based on expert judgment or historical data on security violations. The resulting probability estimates indicate the relative likelihood of different compromise paths and provide an input for security resource allocation. Application of the methodology is demonstrated using a national security example. A set of compromise paths and probability models specifically addressing this example espionage problem are developed. The probability models for hard-copy information compromise paths are quantified as an illustration of the results using parametric values representative of historical data available in secure facilities, supplemented where necessary by expert judgment.
Files
article.pdf
Files
(760.5 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:fe927f034305a7079402535de61a0d57
|
760.5 kB | Preview Download |