ImageVerifierCode 换一换
格式:PDF , 页数:19 ,大小:4.04MB ,
资源ID:685468      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-685468.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(DIN SPEC 91293-2013 Security Modeling Technique (SMT) for visualizing and analyzing security relevant information based on security levels《基于安全级观察和分析安全相关信息的安全建模技术(SMT)》.pdf)为本站会员(bowdiet140)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

DIN SPEC 91293-2013 Security Modeling Technique (SMT) for visualizing and analyzing security relevant information based on security levels《基于安全级观察和分析安全相关信息的安全建模技术(SMT)》.pdf

1、May 2013 Bereich InnovationDIN-SprachendienstEnglish price group 12No part of this translation may be reproduced without prior permission ofDIN Deutsches Institut fr Normung e. V., Berlin. Beuth Verlag GmbH, 10772 Berlin, Germany,has the exclusive right of sale for DIN Specifications.ICS 13.200; 03.

2、220.40; 47.040; 47.060There are various procedures for developing a DIN SPEC: This document has been developed in accordance with the PAS procedure.!%2“2021597www.din.deDDIN SPEC 91293Security Modelling Technique (SMT) for visualizing and analyzingsecurity relevant information based on security leve

3、lsEnglish translation of DIN SPEC 91293:2013-05Security-Modellierungstechnik (SMT) zur gefahrenstufenabhngigen Darstellung undAnalyse sicherheitsrelevanter InformationenEnglische bersetzung von DIN SPEC 91293:2013-05Technique de modlisation de scurit (TMS) pour une visualisation dpendante du degrde

4、danger et une analyse dinformations relevantes de la scuritTraduction anglaise de DIN SPEC 91293:2013-05www.beuth.deDocument comprises 19 pages12.13 DIN SPEC 91293:2013-05 2 A comma is used as the decimal marker. Contents Page Foreword 3 Introduction .4 1 Scope 5 2 Normative references 5 3 Terms and

5、 definitions .5 4 Description of the Security Modelling Technique 6 4.1 General notes .6 4.2 Modelling of local factors .7 4.2.1 The “Area” component .7 4.2.2 The “Ship” component 7 4.2.3 The “Restricted Area” component .8 4.2.4 The “Other Area” component .9 4.3 Modelling of security levels 9 4.4 Mo

6、delling of measures . 10 4.4.1 The “Measures” component 10 4.4.2 The “Resource” component 11 4.5 Modelling of processes 12 4.5.1 The “Start” and “End” components . 12 4.5.2 The “Control Flow” component 12 4.5.3 Example of process modelling 13 4.6 Modelling of communication . 13 4.6.1 The “Contact Po

7、int”component 13 4.6.2 The “Communication Flow” component 13 4.6.3 Example of communication modelling . 14 4.7 Modelling of supplementary information . 14 4.7.1 The “Note” component 14 4.7.2 The “Reference” component . 15 4.7.3 The “Connection” component . 15 4.7.4 The “Grouping” component 15 Annex

8、A (informative) Example of an SMT model for the application domain “Passenger shipping” . 17 Bibliography . 19 DIN SPEC 91293:2013-05 3 Foreword This DIN Specification, according to the PAS procedure, describes the components used within the Security Modelling Technique (SMT) as well as the procedur

9、es required for generating SMT models. The purpose of the SMT is to support the decision process of the security management team during the implementation of security levels and the generation and assessment of security measures by responsible institutions. The authors are: Daniel Ley, Fraunhofer In

10、stitute for Communication, Information Processing and Ergonomics (FKIE) Hartmut Adam, Reederei Scandlines mbH Karsten Hilbrandt, Department of Transport of Mecklenburg-Vorpommern (designated authority for port facility security) Michael Kalus, Lbecker Hafen-Gesellschaft mbH Michael Katzmarzik, State

11、 police of Schleswig-Holstein, Dept. 43: Designated authority for port facility security Florian Motz, Fraunhofer Institute for Communication, Information Processing and Ergonomics (FKIE) Johannes-Stephan Salzig, State police of Schleswig-Holstein, Dept. 43: Designated authority for port facility se

12、curity The publication of the DIN SPEC was overseen by the Business Development department of DIN, the German Institute for Standardization. The authors are solely responsible for ensuring that the content of this document is correct. No standard covering this topic is currently in existence. Work o

13、n this specification was supported financially by the German Federal Ministry of Education and Research (BMBF) within the collaborative project INFRANORM. Work carried out is based on the findings of the collaborative BMBF projects VESPER and VESPERPLUS. DIN, German Institute for Standardization Bus

14、iness Development (ENA) 10.01.2013 DIN SPEC 91293:2013-05 4 Introduction Since the attacks of September 11, 2001 a wide range of methods and technologies have been developed and optimized across the board to raise security standards and combat any terrorist threat. The collaborative VESPER project i

15、mproving human security in ferry shipping was supported by the German Federal Ministry of Education and Research (BMBF) as part of the German Governments high-tech strategy for a total of three years between 2008 and 2011. One of the positive and most widely acclaimed outcomes of VESPER was the deve

16、lopment of the Security Modelling Technique (SMT, Ley Ley Ley et al., 2011 3). The assessment of ports and ships revealed five data categories which are important to the successful execution of a situation analysis and for making security personnel aware of their relevant situation so that they can

17、implement and amend security levels more effectively: location factors such as infrastructure; security levels to allow the selection of measures required by the situation; measures to safeguard security-relevant areas; processes to implement security measures in a structured fashion; communication

18、between the people and authorities involved. A number of different methodologies make use of some of these data categories to analyze critical situations and to help generate solutions, in addition to using them to develop and assess everyday business security plans. However, VESPER could not identi

19、fy a methodology which could integrate all five categories in a viable way and enable an analysis. This poses certain challenges when it comes to security analyses, most notably in a business context where security critical situations require that appropriate and comprehensive measures be taken in r

20、eal time. The SMT aims to support security management teams with their decision making process, particularly when implementing and amending security levels, or when assessing the suitability and completeness of measures already implemented by the authorities. In doing so, the SMT draws from an integ

21、rated representation of all five data categories. DIN SPEC 91293:2013-05 5 1 Scope The number of modelling components was intentionally kept low to guarantee a simple generation of an SMT model which could be used by any security management personnel. The fundamental applicability of the method rema

22、ins the same irrespective of its domain, which means that the implementation of SMT is not limited to passenger shipping. Of primary interest are working environments where information is to be processed and acted upon depending on the level of security involved. SMT components and the modus operand

23、i for establishing SMT models are described in this DIN specification. Models established in accordance with this DIN specification should be applied to the following tasks: quickly retrieving and assigning information relating to specific security levels; supporting security management personnel in

24、 their decision-making process when implementing security measures relating to specific security levels; supporting the situational awareness of personnel relating to measures which are to be or have already been implemented; assessing the completeness of existing security measures. Generated SMT mo

25、dels can be either applied system-based (e.g. in the SMT Editor) or paper-based with the help of a printout. 2 Normative references The following documents, in whole or in part, are normatively referenced in this document and are indispensable for its application. For dated references, only the edit

26、ion cited applies. For undated references, the latest edition of the referenced document (including any amendments) applies. SOLAS, XI-2 (2004): International Convention for the Safety of Life at Sea. Chapter XI-2: Regulation (EC) No 725/2004 of the European Parliament and of the Council of 31 March

27、 2004 on enhancing ship and port facility security (ISPS Code). 3 Terms and definitions For the purposes of this document, the following term and definition applies. 3.1 security the warding off of threats resulting from planned/premeditated actions (including criminal actions) to the detriment of p

28、eople and/or entire sections of the population, facilities and/or objects based on DIN SPEC 91282 DIN SPEC 91293:2013-05 6 4 Description of the Security Modelling Technique 4.1 General notes The SMT concept encompasses five integrated modelling levels represented in one model: 1) location factors; 2

29、) security levels; 3) measures; 4) processes; 5) communication. There are also modelling components which cannot be assigned exclusively to any particular level: 6) supplementary information. The SMT model example in Figure 1 is designed to give an overall impression. A model of this kind (the examp

30、le shown is a sea ferry with its interfaces facing the shore side port zones) offers the security personnel a summary of the relevant information from all five modelling levels. Figure 1 Example of an SMT model Described in the following clauses are the individual components of modelling levels 1 to

31、 5 (as per the list above) and supplementary information which serve as the basis for the generation of the model as a whole; their sequence is consistent with the recommended modelling sequence. Any text entered in models shall always be visible in its entirety and shall not be covered up by compon

32、ents or cut off by components which are too small. DIN SPEC 91293:2013-05 7 4.2 Modelling of local factors Any SMT model is based, first and foremost, on local factors with security-relevant information being added to later modelling levels. The benefit of this is that information relating to real-l

33、ife areas can be found and retrieved quickly. The following modelling components define local factors. 4.2.1 The “Area” component This component (see Figure 2) is representative of one area. The contours of the component are not specified, however, as the model aims to depict reality as realisticall

34、y as possible. The components relating to the other modelling levels are placed in here. The area is labelled in the bottom right hand corner within the component borders (shown as “Area” in the figure). If, for example, a photograph of the real area to be modelled is available, then this too can be

35、 used as an area component for an SMT model. It shall not, however, contain additional information which might interfere with the efficient use of an SMT model. Figure 2 The “Area” component 4.2.2 The “Ship” component As the SMT was developed for use with passenger shipping, a component depicting sh

36、ips (see Figure 3) was created in addition to the “Area” component in 4.2.1. What we see here is a plan view of a ship (depicting an additional or alternative side view would also be possible). What applies to the “Area” component in 4.2.1 applies in equal measures to the “Ship” component: The conto

37、urs are not specified, however, as the model aims to depict reality as realistically as possible. The components relating to the other modelling levels are placed in here. The ship is labelled in the centre towards the very right within the component borders. If, for example, a photograph of the rea

38、l ship to be modelled is available, then this too can be used as a ship component for an SMT model. It shall not, however, contain additional information which might interfere with the efficient use of an SMT model. DIN SPEC 91293:2013-05 8 Figure 3 The “Ship” component 4.2.3 The “Restricted Area” c

39、omponent This component (see Figure 4) shows the contours of a restricted (closed) area. It conveys the fact that restrictions have been imposed regarding accessing or staying in this area. The contours are not specified, however, as the model aims to depict reality as realistically as possible. In

40、line with real circumstances one or more of these components will be placed in a ships or areas component. Further components can be modelled based on it. A restricted area is labelled bottom right within the component borders. If, for example, a photograph of the real access-restricted area to be m

41、odelled is available, then this too can be used as a component for an SMT model. It shall not, however, contain additional information which might interfere with the efficient use of an SMT model. Figure 4 The “Restricted Area” component DIN SPEC 91293:2013-05 9 4.2.4 The “Other Area” component This

42、 component (see Figure 5) shows the contours of another area. It conveys the fact that generally no restrictions have been imposed regarding accessing or staying in this area. In line with real circumstances this component will be placed in a ships or areas component. Further components can be model

43、led based on it. Another area is labelled bottom right within the component borders. If, for example, a photograph of the real other area to be modelled is available, then this too can be used as a component for an SMT model. It shall not, however, contain additional information which might interfer

44、e with the efficient use of an SMT model. Figure 5 The “Other Area” component 4.3 Modelling of security levels Information relating to specific security levels is shown colour-coded in the SMT. The colour scheme was designed to be as intuitive as possible. The usual three security levels (for instan

45、ce in passenger shipping) are given the following RGB coding in the SMT: security level I: R204, G255, B204 (green); security level II: R255, G255, B204 (yellow); security level III: R255, G204, B153 (red). In addition to the colour scheme modelling, components relating to specific security levels a

46、re also labelled using Roman numerals (in case of three security levels: I, II and III). The SMT components (measures, resources and contact points) shown in Figure 6 use this colour scheme and type of labelling to denote specific security levels. The number of security levels has not been specified

47、 in the SMT so that it can be applied to domains with more or less defined levels. Correspondingly, the relevant modelling components in the colour scheme and the labelling (at five or just two security levels for instance) can be easily expanded or restricted. An intuitive colour gradient from gree

48、n (lowest security level) up to red (highest security level) needs to be maintained. DIN SPEC 91293:2013-05 10 Figure 6 The “Measures”, “Resource” and “Contact Point” components exhibit information relating to specific security levels using colours and Roman numerals. 4.4 Modelling of measures Once spatial circumstances have been modelled (see 4.2), measures can be assigned to them relating to specific security levels (see 4.3). Two components are used to illustrate measures: The “Measures” compon

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1