Skip to main content

Focusing on the Threats to the Detriment of the Vulnerabilities: A Vulnerability Assessor’s Perspective

  • Conference paper
Nuclear Terrorism and National Preparedness

Abstract

Security and emergency response usually fail due to a failure to identify and mitigate vulnerabilities, rather than a failure to envision threats. Unfortunately, however, threats usually receive more attention than vulnerabilities. Design Basis Threat and layered security exacerbate the problem. There are a number of aspects of nuclear security that require considerably more attention to the vulnerabilities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnston RG (2010) Being vulnerable to the threat of confusing threats with vulnerabilities. J Phys Secur 4(2):30–34

    MathSciNet  Google Scholar 

  2. Johnston RG, Warner JS (2013) Debunking vulnerability assessment myths. SecurityInfoWatch, August 6 & 13, 2013, Part 1: http://www.securityinfowatch.com/article/11078830/experts-discuss-commonly-held-misconceptions-about-vulnerability-assessments. Part 2: http://www.securityinfowatch.com/article/11108983/experts-discuss-the-characteristics-of-good-vulnerability-assessors

  3. American Society of Civil Engineers (2007) The New Orleans Hurricane protection system. What went wrong and why? http://www.asce.org/uploadedfiles/publications/asce_news/2009/04_april/erpreport.pdf

  4. Bunn M, Sagan SD (2014) A worst practices guide to insider threats: lessons from past mistakes. American Academy of Arts and Sciences. http://cisac.fsi.stanford.edu/sites/default/files/insiderThreats.pdf

  5. SlashGear (2014) Target reportedly ignored credit card hack warnings, March 14, 2014. http://www.slashgear.com/target-reportedly-ignored-credit-card-hack-warnings-14320673/

  6. Leonnig CD (2014) White House fence-jumper made it far deeper into building than previously known. Washington Post, September 29, 2014

    Google Scholar 

  7. Wikipedia, “White House Intruders”. http://en.wikipedia.org/wiki/White_House_intruders

  8. Johnston R, Folk C, Warner J (2014) Fearing NORQ, and why doing so is bad for security. Homel Secur Today 11(4):39–41. http://www.nxtbook.com/nxtbooks/kmd/hst_20140607/#/40

  9. Harford T (2014) How to see into the future. Financial Times, September 6, 2014. http://www.ft.com/cms/s/2/3950604a-33bc-11e4-ba62-00144feabdc0.html#axzz3GhgHv4aA

  10. Wiltermuth SS (2011) Cheating more when the spoils are split. Organ Behav Hum Decis Process 115(2):157–168

    Article  Google Scholar 

  11. Bitzer E (2006) Strategies for cutting turnover. Secur Manag 50(5):88–94

    Google Scholar 

  12. Johnston RG (2010) Changing security paradigms. J Phys Secur 4(2):35–47

    MathSciNet  Google Scholar 

  13. Johnston RG (2005) The ‘Anti-Evidence’ approach to tamper-detection. Packag Transp Storage Secur Radioact Mater 16:135–143

    Article  MathSciNet  Google Scholar 

  14. Johnston RG, Warner JS (2012) How to choose and use seals. Army Sustain 44(4):54–58. http://www.almc.army.mil/alog/issues/JulAug12/browse.html

Download references

Acknowledgments and Disclaimer

The views expressed here are those of the author and should not necessarily be ascribed to Argonne National Laboratory or the United States Department of Energy. Jon Warner provided important ideas and expertise.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Roger G. Johnston .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer Science+Business Media Dordrecht

About this paper

Cite this paper

Johnston, R.G. (2015). Focusing on the Threats to the Detriment of the Vulnerabilities: A Vulnerability Assessor’s Perspective. In: Apikyan, S., Diamond, D. (eds) Nuclear Terrorism and National Preparedness. NATO Science for Peace and Security Series B: Physics and Biophysics. Springer, Dordrecht. https://doi.org/10.1007/978-94-017-9891-4_14

Download citation

Publish with us

Policies and ethics