13.07.2015 Views

PDF - The Journal of Physical Security - Argonne National Laboratory

PDF - The Journal of Physical Security - Argonne National Laboratory

PDF - The Journal of Physical Security - Argonne National Laboratory

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>The</strong> <strong>Journal</strong> <strong>of</strong> <strong>Physical</strong> <strong>Security</strong> 4(2), i‐viii (2010)Editor’s CommentsWelcome to the second issue <strong>of</strong> volume 4 <strong>of</strong> the <strong>Journal</strong> <strong>of</strong> <strong>Physical</strong> <strong>Security</strong> (JPS). This isthe first time that we have published two issues in the same year. This issue containspapers about securing houses <strong>of</strong> worship, estimating explosive blast damage, thedifferences between threats and vulnerabilities, and emerging new security paradigms.As usual, the views expressed in the <strong>Journal</strong> <strong>of</strong> <strong>Physical</strong> <strong>Security</strong> are those <strong>of</strong> therespective authors and should not necessarily be ascribed to <strong>Argonne</strong> <strong>National</strong> <strong>Laboratory</strong>or the United States Department <strong>of</strong> Energy.<strong>The</strong>re continues to be considerable enthusiasm for JPS on the part <strong>of</strong> the readership, butalso a lot <strong>of</strong> trepidation among potential authors who are considering submittingmanuscripts. (I know this because they <strong>of</strong>ten call me up with potential topics, worriedabout proceeding.) Authors who have published in JPS have found the process rewarding,have gained fresh insight into important security issues, and have educated a lot <strong>of</strong> readerson important security points. Please consider submitting a manuscript and encouragingcolleagues and students to do likewise!What follows are some rambling thoughts about physical security vs. cyber security, theimportance <strong>of</strong> a stiff upper lip, patents and security, and how to spot <strong>Security</strong> <strong>The</strong>ater._____________________________I gave the Keynote Address at the 19 th Annual USENIX Conference in Washington, D.C. inAugust. (See http://www.youtube.com/watch?v=51MxGK2q7Wo) This was the first timeI’ve attended USENIX. I was very favorably impressed with the quality <strong>of</strong> the presentationsand the work they represent. I was also struck by how different the cyber security cultureis from the physical security culture.This difference greatly complicates the Convergence problem—also known as the “Thugsvs. Nerds” problem—which is the bringing together <strong>of</strong> physical and cyber security.Increasingly, good cyber security requires better physical security, and physical securitypractitioners find themselves working with s<strong>of</strong>tware programs and with hardware devicesthat are interfaced to complex cyber networks and/or have substantial embeddedcomputing or microprocessor power. Cyber vulnerabilities can quickly become physicalsecurity vulnerabilities, and vice versa.Having moved around a bit in both worlds, here are my lists <strong>of</strong> what cyber securitypr<strong>of</strong>essionals and physical security pr<strong>of</strong>essionals can potentially learn from each other:i

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!