Biosecurity – Flashcards
Unlock all answers in this set
Unlock answersquestion
Biosafety
answer
Prevent exposure to or accidental release of potentially hazardous and/or regulated biochemical materials
question
Biosecurity
answer
Prevent the theft, misuse, or intentional release of these materials
question
Integrated Biorisk Management
answer
Combination of biosafety and biosecurity, working safely and keeping the work secure
question
Anthrax
answer
Spores must be milled for weaponization. Anthrax would kill 1/3, weaponized anthrax 3/4
question
Biosafety and Biosecurity
answer
Should be used together as an integrated approach to define the laboratory operating environment
question
Caveats of biosecurity
answer
Most agents can be isolated from nature or exist elsewhere in culture collection. Few agents can be easily grown, processed, weaponized and successfully deployed while maintaining virulence/toxicity. These are "dual use" agents
question
Dual Use agents
answer
Useful for many legitimate defensive, commercial, medical and research applications
question
Challenges of biosecurity
answer
Living and self replicating organisms cannot be reliably quantified. Agents are used in small quantities in a variety of operations. Contained biological samples are virtually undetectable. Biological research communities are not accustomed to operation in a security conscious environment
question
Objectives of Biosecurity
answer
1) Protect against "unacceptable" risks
2) Be prepared to respond to "acceptable" risks
3) Cost and measures to protect should be proportional to risk of release or malicious use
question
Risk Assessment
answer
Need methodology to make informed decisions about how to design an effective and efficient biosecurity system. Protection levels should be proportional to risk of loss (theft or destruction)
question
Assets
answer
What requires protection. Dangerous materials, hard to replace materials, rare materials, materials critical to operations
question
Asset Examples
answer
IT systems, hardware, research data, lab equipment, chemicals, research material (agents, animals, etc), personnel, buildings
question
Malicious Use Risk : Consequences
answer
Contagiousness. Medical effects (Morbidity, Mortality). Potential to become endemic. Economic impact.
question
Risks
answer
Low, moderate, high, extreme
question
Malicious Use Risk : Weaponization Potential
answer
Acquisition. Production Challenges (Ease of growth, processing, storage). Modes of dissemination. Environmental hardiness
question
Bacillus Anthracis Malicious Use Risk : Consequences
answer
Contagiousness : Low (none or limited).
Medical effects : High (moderate to severe morbidity, moderate mortality).
Endemic vs. Epidemic : Moderate- High (Endemic/ Exotic).
Economic : Moderate-High (Limited -> Moderate)
Overall : Moderate to high consequences
question
Bacillus Anthracis Malicious Use Risk : Weaponization
answer
Ease of acquisition: Moderate (Limited)
Production Challenges : High (Limited)
Mode of dissemination : Moderate (Easily released)
Environmental Stability : Extreme (High)
Overall risk : High -> Extreme risk for weaponization
question
Bacillus Anthracis Malicious Use Risk : Results
answer
Consequences : Moderate to high.
Weaponization risk : Relatively high.
Overall malicious use risk : High
question
Threats
answer
Who or what are we protecting from?
question
Outsider Threats
answer
No authorized access
question
Insider Threats
answer
Authorized access to facility, materials and restricted information
question
Threat Potential : Motive
answer
Asset attractiveness- How well does acquisition or sabotage achieve or help achieve adversary's objective
question
Threat Potential : Means
answer
Capability : Does the adversary have skills, knowledge and tools necessary to conduct attack / meet objective?
question
Threat Potential : Opportunity
answer
Environment : Is adversary active in area? How recently have they acted in ways that may be threatening? Has there been any indication of targeting?
question
Threat Potentials
answer
Motive, Means, Opportunity
question
Potential Threat Examples
answer
Animal right's activists, disgruntled employees, terrorists, criminals
question
Risk Management
answer
More "outsiders," less "insiders." Force adversary to get material/assets elsewhere. Make yourself a less desirable target. Don't comprise legitimate operations without cause, impact operations only to level required
question
Realities of security management
answer
Cannot protect every asset against any threat. Resources are finite. Security systems should be based on the asset or material requiring protection. Should be designed to address unique situations
question
5 components of a biosecurity system
answer
Physical Security.
Personnel Security.
Information Security.
Material control and accountability.
Transport security.
question
Physical Security
answer
Graded, increases towards highest risk asset
question
Protected area
answer
Includes grounds, public access areas. Fences, building boundaries.
question
Limited area
answer
Labs, certain offices, corridors around exclusion area. Require unique credentials for access (key card, controlled key)
question
Exclusion area
answer
High containment labs, computer network hubs. Require unique credential AND unique knowledge (password, biometric scan, second person to verify identity). Intrusion detection and response
question
Intrusion Detection
answer
Detection : Guards, sensors.
Validation : Real alarm?
Respond Internally : Security personnel.
Notify external responders : Reinforces / investigates.
question
Implementing physical security
answer
Policies : Escorts, entry logs, etc. Consequences for security violations.
Training : What to do - unrecognized persons, unusual activity, missing badges, keys.
Performance testing and maintenance: Physical and personnel (drills)
question
Personnel security
answer
Employees (Hiring, during employment, transfer/termination). Visitors
question
Responsible, reliable, well trained, trustworthy
answer
Ideal personnel
question
New employees
answer
Should be screened related to access and risk levels. Assure that forms, training and health screening is completed
question
During Employment
answer
ID badges should be worn, clearly indicate access privileges. Security policy violations should be enforced. Employee assistance program to deal with personal employee issues
question
Terminating Employment
answer
Assure paperwork completion for transfer or termination. Transfer accountability for sensitive materials. Retrieve property (badges, keys, equipment). Deactivate computers and access accounts
question
To have complete and timely knowledge of WHAT materials exist, WHERE materials are located, WHO is accountable for the materials
answer
Objective of Material Control and Accountability
question
Material
answer
Description and quantity
question
Material Control
answer
Can be physical or procedural. Containment can provide control. Functional under normal and abnormal conditions.
question
Material Accountability
answer
Must belong to someone. Establish procedure for assignment and expectations
question
Material Control Challenges
answer
Location changes (Labs, storage, repositories). Different samples (Master stocks, working stocks, experiments in progress). Different accountable persons (Shipping, receiving, destruction, testing).
question
Transport/Transfer
answer
Vulnerable. Materials removed from limited access areas, increased pool of people who have access.
question
Implementing Transport Security
answer
Chain of custody: What (Description of materials), Who (Authorized, approved individuals), When (Time & Date signatures for each individual with control), Where (Receipt of material at designated location under appropriate physical security).
question
Transfers
answer
Must be pre-approved by responsible party
question
Material Inventories
answer
Must be constantly updated
question
Confidentiality
answer
Information protected from unauthorized or accidental disclosure
question
Integrity
answer
Information is as intended without inappropriate modification of corruption
question
Information Security
answer
Confidentiality, integrity, availability, transparency
question
Availability
answer
Authorized users can access applications and systems when required
question
Transparency
answer
"Public" has a right to certain information or to know what is being withheld
question
CLC
answer
Community Liaison Committee. Determine which information should be released
question
Implementing Information Security
answer
Define "sensitive" information. Assess all documents for sensitive information. Determine information chain of custody. Determine how to contain information (Physical systems, personnel reliability)
question
Information Security - Physical Security
answer
Hard copies should be secured in limited or exclusion areas, any reproductions should be controlled. Networks and servers should be protected, can be layered.
question
Information Security - Personnel
answer
Access privileges include information. Communication restricted. User should know sensitivity levels of information. The person viewing information is accountable
question
High Risk Assets
answer
Electronic access control. Personnel screening should include more comprehensive background investigation. Accountability records should be maintained. Material transfers should be pre-approved, require a continuous chain of custody. Information about agent security should be protected
question
Material transfers
answer
Should be pre-approved, require a continuous chain of custody