A method of designing, modeling and testing a security system for
protecting a defined security area. The method includes modeling the
security area, modeling the security system for the security area, and
testing the security system using a computer to run various breach
scenarios to determine weaknesses in the security system. The testing may
be in the form of a computer game with one or more players implementing
the models and scenarios or in real-time.