Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Пособие ФИБ 2010 3 курс.doc
Скачиваний:
7
Добавлен:
03.11.2018
Размер:
1.19 Mб
Скачать

6. Answer the questions

What are the first steps of the cost/benefit risk analysis?

Where can the information for the description of the facility be found?

What is a generic fault tree made for?

What should be done if the risk is estimated as unacceptable?

What are the results of undesired events?

7. Mark the following statements true or false. Correct the false statements

  1. PE is the likelihood of adversary attack.

  2. Characteristic of the facility operating states and conditions requires a thorough description of the facility itself (the location of the site boundary, building locations, floor plans, and access points).

  3. The consequence values are the critical assets to protect.

  4. A logic model can be used to identify the critical components.

  5. 1 - PE is adversary success.

Vocabulary tasks

8. Form the word combinations and give their definitions.

Risk, threat.

9. Give your definitions of the following terms.

Estimate risk, facility, consequence, reduce risk, access point, severe environmental damage, threat.

10. Make the word combinations

    1. site

a) detection

    1. commit

b) definition

    1. detect

c) operandi

    1. protection

d) control

    1. intrusion

e) boundary

    1. threat

f) an adversary

    1. assess

g) description

    1. entry

h) an act

    1. consequence

i) objective

    1. modus

j) risk

11. What do the following abbreviations from Text 1 mean?

RAM, PA, PE, C

12. Complete the text.

Events, weapons, to estimate, use, threat

Threat Definition. Before a vulnerability analysis can be completed, a description of the 1) … is required. This description includes the type of adversary, tactics, and capabilities (number in the group, 2) … , equipment, and transportation mode). Also, information is needed about the threat 3) … the likelihood that they might attempt the undesired 4) … . The specific type of threat to a facility is referred to as the design basis threat (DBT). The DBT is often reduced to several paragraphs that describe the number of adversaries, their modus operandi, the type of tools and weapons they would 5) … , and the type of events or acts they are willing to commit.