Featured Research

from universities, journals, and other organizations

Software Addresses Terrorist Building Threats

Date:
June 6, 2005
Source:
National Institute Of Standards And Technology
Summary:
National Institute of Standards and Technology (NIST) economists have released risk assessment software that building owners and managers can use to identify and guard against terrorist threats to their facilities.

National Institute of Standards and Technology (NIST) economists have released risk assessment software that building owners and managers can use to identify and guard against terrorist threats to their facilities.

The software, developed by NIST's Office of Applied Economics (OAE) as part of NIST's commitment to homeland security, is the finished version of a beta program released last year for limited testing.

The "Cost Effectiveness Tool for Capital Asset Protection" (CET), Version 1.0, employs a three-step process for developing a risk mitigation plan. Its essential components are risk assessment, identification of potential mitigation strategies and economic evaluation. CET first allows users to look at possible damage scenarios. Users then can explore strategies to reduce facility vulnerability. Choices include engineering alternatives (such as sensors to detect airborne contaminants); management practices (such as evacuation drills or increased security) and financial mechanisms (such as tax-write offs for capital improvements). Finally,CET users can evaluate the actual life-cycle costs (planning, installation and maintenance) of the various mitigation strategies. The combination of strategies that reflects the lowest life-cycle cost is designated the cost-effective risk mitigation plan.

The software is available for free download at http://www2.bfrl.nist.gov/software/CET/. Users are invited to send comments about Version 1.0 to Robert Chapman at robert.chapman@nist.gov. Suggestions will be used to improve CET 2.0 expected to be released in 2006.


Story Source:

The above story is based on materials provided by National Institute Of Standards And Technology. Note: Materials may be edited for content and length.


Cite This Page:

National Institute Of Standards And Technology. "Software Addresses Terrorist Building Threats." ScienceDaily. ScienceDaily, 6 June 2005. <www.sciencedaily.com/releases/2005/06/050604202646.htm>.
National Institute Of Standards And Technology. (2005, June 6). Software Addresses Terrorist Building Threats. ScienceDaily. Retrieved July 29, 2014 from www.sciencedaily.com/releases/2005/06/050604202646.htm
National Institute Of Standards And Technology. "Software Addresses Terrorist Building Threats." ScienceDaily. www.sciencedaily.com/releases/2005/06/050604202646.htm (accessed July 29, 2014).

Share This




More Computers & Math News

Tuesday, July 29, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Teen's Phone Ignites Under Her Pillow; How Real Is The Risk?

Newsy (July 28, 2014) A Texas teen's Samsung phone apparently ignited while she slept, but what was the real problem here? Video provided by Newsy
Powered by NewsLook.com
Google's Next Frontier: The Human Body

Google's Next Frontier: The Human Body

Newsy (July 27, 2014) Google is collecting genetic and molecular information to paint a picture of the perfectly healthy human. Video provided by Newsy
Powered by NewsLook.com
Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Cellphone Unlocking Bill Clears U.S. House, Heads to Obama

Reuters - US Online Video (July 27, 2014) Congress gets rid of pesky law that made it illegal to "unlock" mobile phones without permission, giving consumers the option to use the same phone on a competitor's wireless network. Mana Rabiee reports. Video provided by Reuters
Powered by NewsLook.com
Congress OKs Unlocking Phones From Carriers

Congress OKs Unlocking Phones From Carriers

Newsy (July 26, 2014) A bill legalizing "unlocking," or untethering a phone from its default wireless carrier, has passed Congress and is expected to be signed into law. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins