Font Size: a A A

Research On Efficiency Evaluation Method Of Security Prevention System For Terrorist Attack

Posted on:2022-11-13Degree:MasterType:Thesis
Country:ChinaCandidate:J Y RenFull Text:PDF
GTID:2506306752465204Subject:Automation Technology
Abstract/Summary:PDF Full Text Request
With the continuous development of the trend of multi-polarization in today’s world,the momentum of terrorism has gradually grown,and the consequences of terrorist attacks have become increasingly serious.In the past 10 years,my country has also suffered from the harm and influence of terrorist attacks.High-risk units such as transportation hubs,government agencies,and military-industrial units have become the main targets of terrorist attacks in my country.my country has also carried out certain research in the field of security protection effectiveness evaluation,but lacks the calculation method and effectiveness evaluation of the security protection system(security system)protection capability against terrorist attacks in different protection scenarios.This paper introduces the effectiveness evaluation method of weapon equipment system in the military field.According to different types of protection objects,based on ADC,cloud model and network structure model,the corresponding security system effectiveness evaluation model for terrorist attacks is established,and the site is selected for verification.,in order to find protection loopholes and make up for shortcomings.By reading the relevant materials,this paper studies the security system performance evaluation index system facing the threat of terrorist attacks.The index system uses 4 first-level indicators and 16 second-level indicators as quantitative evaluation standards,and evaluates the security system according to the weight and score of each indicator combined with the relevant methods of this paper’s performance evaluation.According to the different characteristics of high-risk protection objects,this paper divides protection units into open protection units,closed administrative protection units,and closed non-administrative protection units,and selects representative application objects(transportation hubs,government agencies,Research Institute),to carry out security system effectiveness evaluation experiments:(1)For open protection units,which do not have obvious perimeters and are densely populated,the existing security systems mainly rely on technical protection facilities to complete detection and delay capabilities.This paper takes X railway station as the application object,establishes an ADC-based security system performance evaluation model for terrorist attacks,and carries out performance evaluation of its security system to realize application verification.Finally,through the performance evaluation,the security system of X railway station found the weak points of protection,and further improved the protection ability.(2)For closed administrative protection units,the protection range is certain,but there is no core target area to be protected,the protection objects are scattered,and the uncertainty of being attacked is strong.In this paper,taking Bureau A of the Public Security Bureau of Xinjiang as the application object,a cloud model-based security system effectiveness evaluation model for terrorist attacks is established,and the effectiveness of its security system is evaluated to realize application verification.Finally,through the performance evaluation,the security system of Bureau A has obvious advantages in defending against similar explosion threats.(3)For closed non-administrative protection units,it has obvious key protection areas,core assets have great value,security systems have in-depth protection functions,and the layers are obvious,which can achieve complete detection,delay,response,and timely disposal of emergencies.event.This paper selects Institute B of the Aircraft Research Institute as the application object,establishes a network structure performance evaluation model,and conducts performance evaluation of its security system to realize application verification.Finally,through the performance evaluation,B found the weakest intrusion path,and achieved a new improvement in the protection capability of the whole range.
Keywords/Search Tags:Efficacy evaluation, security system, ADC(structural analysis method), cloud model, network structure model
PDF Full Text Request
Related items