SlideShare a Scribd company logo
Journal	of	Physical	Security	12(3),	30-32	(2019)	
	
30
	
Viewpoint	Paper	
	
	
Design	Reviews	Versus	Vulnerability	Assessments	for	Physical	Security*	
	
	
Roger	G.	Johnston,	Ph.D.,	CPP	
Right	Brain	Sekurity	
http://rbsekurity.com	
	
	
				A	Vulnerability	Assessment	(VA)	involves	identifying	and	perhaps	testing/demonstrating	
security	flaws	and	likely	attack	scenarios,	then	recommending	changes	to	how	the	security	
device,	system,	or	program	is	designed	or	used.		This	is	done	in	hopes	of	improving	
security.			
	
				Getting	security	managers	and	organizations	to	pursue	a	VA	can	be	challenging.		For	one	
thing,	VAs	often	get	confused	with	other,	more	familiar	and	comfortable	analysis	
techniques	which	either	(1)	aren't	primarily	about	vulnerabilities	at	all,	or	(2)	that	do	have	
something	minor	to	say	about	vulnerabilities	but	aren't	typically	very	good	at	profoundly	
uncovering	new	vulnerabilities.[1,2]		For	example,	a	VA	is	not	a	“test”	or	a	“certification”	
process	for	a	security	product	or	program.		It	is	something	quite	different	from	“Red	
Teaming”,	penetration	testing,	security	surveys,	Threat	Assessments,	Risk	Management,	
fault/event	trees,	and	Design	Basis	Threat—though	these	things	might	well	be	worth	doing.	
		
			Another	impediment	to	arranging	for	VAs	is	that	are	typically	time-consuming	and	
relatively	expensive.		This	is	especially	true	given	that	VAs	should	ideally	be	done	period-
ically	and	iteratively	from	the	earliest	design	stage	through	marketing	and	deployment	of	a	
new	security	product,	system,	strategy,	or	program.			
	
				Perhaps	more	daunting,	VAs	are	often	feared	by	security	managers	and	organizations	
because	an	effective	VA	will	inevitably	uncover	multiple	vulnerabilities.		In	my	view,	this	is	
the	wrong	mindset	for	thinking	about	security,	but	it	nevertheless	is	quite	common.		
Finding	a	vulnerability	is	actually	good	news	because	vulnerabilities	are	always	present	in	
large	numbers,	and	finding	one	means	we	can	potentially	do	something	about	it.		Moreover,	
it	is	my	experience	that	serious	vulnerabilities	can	often	be	mitigated	or	eliminated	with	
simple	changes	to	the	design	of	a	security	product/program,	or	how	it	is	used.		But	the	
security	improvements	aren’t	possible	if	the	vulnerabilities	go	unrecognized!	
	
				I	have	found	that	many	security	managers	and	organizations	are	much	more	comfortable	
with	a	“Design	Review”,	rather	than	a	Vulnerability	Assessment.		Arranging	for	a	review	of	
the	design	of	a	security	product,	system,	strategy,	or	program	is	more	familiar—and	a	
whole	lot	less	scary—than	targeting	security	flaws.		In	a	Design	Review,	there	is	a	brief		
________________	
*This	paper	was	not	peer	reviewed.
Journal	of	Physical	Security	12(3),	30-32	(2019)	
	
31
review	of	the	design	and	engineering	issues,	and	then	recommendations	are	offered	for	
improving	the	design	or	the	use	protocol.		Fewer	vulnerabilities,	attack	scenarios,	and		
countermeasures	are	developed	in	a	Design	Review	than	for	a	VA,	and	they	are	typically		
not	tested	or	demonstrated	like	in	a	VA.			
	
				While	a	Design	Review	will	not	permit	as	deep	an	understanding	of	vulnerability	issues	
as	a	VA,	it	still	offers	the	security	manager	or	organization	the	opportunity	to	improve	their	
security	at	modest	cost	in	a	short	period	of	time.		Moreover,	in	my	experience,	about	half	of	
the	organizations	that	arrange	for	a	Design	Review	eventually	commission	a	Rudimentary	
Vulnerability	Assessment	(RVA)	or	a	Comprehensive	Vulnerability	Assessment	(CVA)	once	
they	see	the	results	and	recommendations	from	the	Design	Review,	and	that	those	results	
aren’t	all	that	frightening.		Most	of	the	work	that	went	into	the	Design	Review	is	directly	
applicable	to	conducting	either	a	RVA	or	a	CVA.		The	main	differences	between	a	RVA	and	a	
CVA	are	time,	cost,	and	the	number	of	vulnerabilities,	attacks,	and	countermeasures	that	
can	be	found	and	demonstrated.		
	
				An	alternative	to	a	Design	Review	is	a	Market	Analysis	where	a	new	security	product	is	
compared	to	existing	products.		Potential	applications	and	end	users	are	also	identified.		A	
Market	Analysis	can	be	a	relatively	non-frightening	way	to	introduce	some	vulnerabilities	
issues	and	potential	countermeasures	without	seeming	to	overtly	criticize	the	security	
product	or	service.			
	
				The	bottom	line:		sometimes	a	Design	Review	or	a	Market	Analysis	can	sneak	in	
information	about	vulnerabilities,	attack	scenarios,	and	possible	countermeasures	in	a	
more	palatable	way	than	a	Vulnerability	Assessment.		This	can	be	helpful	for	security	
managers	and	organizations	who	are	hesitant	or	fearful	of	learning	about	their	security	
vulnerabilities,	or	don’t	have	the	time	or	funding	for	a	true	Vulnerability	Assessment.	
	
	
	
About	the	Author	
					
				Roger	G.	Johnston,	Ph.D,	CPP	is	head	of	Right	Brain	Sekurity	(http://rbsekurity.com),	a	
company	devoted	to	design	reviews,	vulnerability	assessments,	market	analyses,	and	R&D	
for	physical	security.		LinkedIn:		http://www.linkedin.com/in/rogergjohnston.	
	
		
	
References	
	
1.		RG	Johnston,	“Being	Vulnerable	to	the	Threat	of	Confusing	Threats	with	Vulnerabilities”,	
Journal	of	Physical	Security	4(2),	30-34,	2010,	http://jps.rbsekurity.com.	
	
2.		RG	Johnston	and	JS	Warner,	“Debunking	Vulnerability	Assessment	Myths”,	
SecurityInfoWatch,	August	6	&	13,	2013,		
Part	1:
Journal	of	Physical	Security	12(3),	30-32	(2019)	
	
32
http://www.securityinfowatch.com/article/11078830/experts-discuss-commonly-held-
misconceptions-about-vulnerability-assessments	
Part	2:	
http://www.securityinfowatch.com/article/11108983/experts-discuss-the-
characteristics-of-good-vulnerability-assessors

More Related Content

PDF
Vulnerability Assessment Myths
DOCX
Backtrack manual Part1
PPTX
Web Application Security Vulnerability Management Framework
PDF
Vulnerability Management Program
PDF
Designing NextGen Threat Identification Solutions
PDF
10 Steps to Building an Effective Vulnerability Management Program
PDF
Implementing Vulnerability Management
PDF
Penetration Testing Guide
Vulnerability Assessment Myths
Backtrack manual Part1
Web Application Security Vulnerability Management Framework
Vulnerability Management Program
Designing NextGen Threat Identification Solutions
10 Steps to Building an Effective Vulnerability Management Program
Implementing Vulnerability Management
Penetration Testing Guide

What's hot (19)

PDF
Is Your Vulnerability Management Program Irrelevant?
PDF
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
PDF
IT Risk managment combined
PDF
A Practical Approach to Managing Information System Risk
PPT
Risk assesment
PPTX
Full stack vulnerability management at scale
PPTX
Web Application Vulnerability Management
PPTX
Vulnerability Management: What You Need to Know to Prioritize Risk
PDF
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
PDF
Is Your Vulnerability Management Program Keeping Pace With Risks?
PPTX
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
PPTX
Information Secuirty Vulnerability Management
PDF
Vulnerability Management
PPTX
Effective Vulnerability Management
PPTX
Vulnerability Assessment Presentation
PPT
Planning and Deploying an Effective Vulnerability Management Program
PPTX
Vulnerability Assesment
PDF
Focusing on the Threats to the Detriment of the Vulnerabilities
PPT
Risk Management
Is Your Vulnerability Management Program Irrelevant?
Outpost24 webinar - Differentiating vulnerabilities from risks to reduce time...
IT Risk managment combined
A Practical Approach to Managing Information System Risk
Risk assesment
Full stack vulnerability management at scale
Web Application Vulnerability Management
Vulnerability Management: What You Need to Know to Prioritize Risk
Strategies improving-vulnerability-assessment-effectiveness-large-organizatio...
Is Your Vulnerability Management Program Keeping Pace With Risks?
Vulnerability Management Nirvana - Seattle Agora - 18Mar16
Information Secuirty Vulnerability Management
Vulnerability Management
Effective Vulnerability Management
Vulnerability Assessment Presentation
Planning and Deploying an Effective Vulnerability Management Program
Vulnerability Assesment
Focusing on the Threats to the Detriment of the Vulnerabilities
Risk Management
Ad

Similar to Design Reviews Versus Vulnerability Assessments for Physical Security (20)

DOC
Adversarial Safety Analysis
DOCX
Security Assurance
DOC
Five Mistakes of Vulnerability Management
PDF
How Does Vulnerability Assessment and Penetration Testing Strengthen Cybersec...
PDF
Taubenberger
PDF
Threats vs. Vulnerabilities
PDF
Vulnerability Assessment and Penetration Testing (VAPT).pdf
PPTX
Risk and testing
PPTX
OWASP Risk Rating Methodology.pptx
PDF
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
DOCX
Risk management planExecutive SummaryThe past.docx
DOCX
Proactive vs. Reactive Approaches to Software Security Strategy
DOCX
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
DOCX
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
DOCX
Explain the differences between a threat assessment- a vulnerability a.docx
PPTX
Security assessment isaca sv presentation jan 2016
PPTX
Risk and Testing by Graham et al
PDF
Unconventional Security Metrics & Marginal Analysis
DOCX
Elements to Consider for Risk Assessment in SaMDs
PDF
Process Safety Blind Spots: EXPOSED [Infographic]
Adversarial Safety Analysis
Security Assurance
Five Mistakes of Vulnerability Management
How Does Vulnerability Assessment and Penetration Testing Strengthen Cybersec...
Taubenberger
Threats vs. Vulnerabilities
Vulnerability Assessment and Penetration Testing (VAPT).pdf
Risk and testing
OWASP Risk Rating Methodology.pptx
Vulnerability Assessment and Penetration Testing: Safeguarding Digital Assets
Risk management planExecutive SummaryThe past.docx
Proactive vs. Reactive Approaches to Software Security Strategy
Chapter 1Managing RiskTHE FOLLOWING COMPTIA SECURITY+ EXAM OBJ.docx
4Brian DennisonJohn DensonIT454 -1504B-01Mon, 121415.docx
Explain the differences between a threat assessment- a vulnerability a.docx
Security assessment isaca sv presentation jan 2016
Risk and Testing by Graham et al
Unconventional Security Metrics & Marginal Analysis
Elements to Consider for Risk Assessment in SaMDs
Process Safety Blind Spots: EXPOSED [Infographic]
Ad

More from Roger Johnston (20)

PDF
In Risu Veritas: Humor & Security
PDF
Journal of Physical Security 15(1)
PDF
Security Audits.pdf
PDF
Camera Obscura and Security/Privacy
PDF
Vulnerability Assessment: The Missing Manual for the Missing Link
PDF
Journal of Physical Security 14(1)
PDF
Want seals with that?
PDF
Journal of Physical Security 13(1)
DOCX
Election Security 2020
PDF
A New Approach to Vulnerability Assessment
PDF
Understanding Vulnerability Assessments
PDF
Devil's Dictionary of Security Terms
PDF
Vulnerability Assessments
PDF
Journal of Physical Security 12(3)
PDF
Journal of Physical Security 12(2)
PDF
Unconventional Security Devices
PDF
Making the Business Case for Security Investment
PDF
Journal of Physical Security 11(1)
PDF
Journal of Physical Security 10(1)
PDF
How to Remove Voter's Ink
In Risu Veritas: Humor & Security
Journal of Physical Security 15(1)
Security Audits.pdf
Camera Obscura and Security/Privacy
Vulnerability Assessment: The Missing Manual for the Missing Link
Journal of Physical Security 14(1)
Want seals with that?
Journal of Physical Security 13(1)
Election Security 2020
A New Approach to Vulnerability Assessment
Understanding Vulnerability Assessments
Devil's Dictionary of Security Terms
Vulnerability Assessments
Journal of Physical Security 12(3)
Journal of Physical Security 12(2)
Unconventional Security Devices
Making the Business Case for Security Investment
Journal of Physical Security 11(1)
Journal of Physical Security 10(1)
How to Remove Voter's Ink

Recently uploaded (20)

PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
A Presentation on Artificial Intelligence
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
Tartificialntelligence_presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Mushroom cultivation and it's methods.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Univ-Connecticut-ChatGPT-Presentaion.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
A Presentation on Artificial Intelligence
Building Integrated photovoltaic BIPV_UPV.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Tartificialntelligence_presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Accuracy of neural networks in brain wave diagnosis of schizophrenia
A comparative analysis of optical character recognition models for extracting...
OMC Textile Division Presentation 2021.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Reach Out and Touch Someone: Haptics and Empathic Computing
Mushroom cultivation and it's methods.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Programs and apps: productivity, graphics, security and other tools
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Design Reviews Versus Vulnerability Assessments for Physical Security