Functional quantitative security risk analysis (QSRA) to assist in protecting critical process infrastructure

被引:41
|
作者
van Staalduinen, Mark Adrian [1 ]
Khan, Faisal [1 ]
Gadag, Veeresh [1 ,2 ]
Reniers, Genserik [1 ,3 ]
机构
[1] Mem Univ, Fac Engn & Appl Sci, Ctr Risk Integr & Safety Engn, St John, NF A1B 3X5, Canada
[2] Mem Univ, Div Community Hlth & Humanities, St John, NF A1B 3V6, Canada
[3] Delft Univ Technol, Safety & Secur Sci Grp S3G, NL-2600 AA Delft, Netherlands
关键词
Quantitative security risk analysis; Bayesian network; Bow-Tie risk model; SYSTEMS; TREES;
D O I
10.1016/j.ress.2016.08.014
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
This article proposes a quantitative security risk assessment methodology that can assist management in the decision-making process where and when to protect critical assets of a chemical facility. An improvement upon previous work is the approach of conducting concurrent Threat and Vulnerability Assessments, as opposed to a sequential approach. Furthermore, this method introduces a Bow Tie risk model mapped into a Bayesian Network model that allows for various logical relaxation assumptions to be applied. Different uncertainty relaxation approaches such as "Noisy-OR" and "Leaky Noisy-OR" and "Noisy-AND" are tested to improve Threat and Vulnerability likelihood. Finally, integrating threat/vulnerability likelihood with potential losses, the security risk is quantified. The potential security countermeasures are characterized into either decreasing vulnerability or decreasing threat likelihood and are reassessed considering a cost analysis. A theoretical case study is conducted to exemplify the execution and application of the proposed method. (C) 2016 Elsevier Ltd. All rights reserved.
引用
收藏
页码:23 / 34
页数:12
相关论文
共 50 条
  • [41] A Risk Assessment Framework for Critical Infrastructure Based on the Analytic Hierarchy Process
    Fioravanti, C.
    Guarino, S.
    Mazza, B.
    Nobili, M.
    Santucci, F.
    Ansaldi, S. M.
    IFAC PAPERSONLINE, 2022, 55 (40): : 277 - 282
  • [42] Quantitative risk analysis - Ship security analysis for effective risk control options
    Liwang, Hans
    Ringsberg, Jonas W.
    Norsell, Martin
    SAFETY SCIENCE, 2013, 58 : 98 - 112
  • [43] Qualitative and quantitative analysis of security in safety and reliability critical systems
    Winther, R
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 2345 - 2351
  • [44] Are standard risk acceptability criteria applicable to critical infrastructure based on environmental security needs?'
    Belluck, DA
    Hull, RN
    Benjamin, SL
    Alcorn, J
    Linkov, I
    ENVIRONMENTAL SECURITY AND ENVIRONMENTAL MANAGEMENT: THE ROLE OF RISK ASSESSMENT, 2006, 5 : 93 - +
  • [45] Security risk analysis for chemical process facilities
    Lemley, JR
    Fthenakis, VM
    Moskowitz, PD
    PROCESS SAFETY PROGRESS, 2003, 22 (03) : 153 - 162
  • [46] Intelligent Risk Detection and Analysis Tools for Critical Infrastructure Protection
    Yasakethu, S. L. P.
    Jiang, J.
    Graziano, A.
    2013 IEEE EUROCON, 2013, : 52 - 59
  • [47] Risk analysis in critical infrastructure systems based on the astrolabe methodology
    Bagheri, Ebrahim
    Ghorbani, Ali A.
    CNSR 2007: PROCEEDINGS OF THE FIFTH ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, 2007, : 335 - +
  • [48] Data use and data needs in critical infrastructure risk analysis
    Larsson, Aron
    Grosse, Christine
    JOURNAL OF RISK RESEARCH, 2023, 26 (05) : 524 - 546
  • [49] Formalizing an Automated, Adversary-aware Risk Assessment Process for Critical Infrastructure
    Jillepalli, Ananth A.
    de Leon, Daniel Conte
    Oyewumi, Ibukun A.
    Alves-Foss, Jim
    Johnson, Brian K.
    Jeffery, Clinton L.
    Chakhchoukh, Yacine
    Haney, Michael A.
    Sheldon, Frederick T.
    2019 IEEE TEXAS POWER AND ENERGY CONFERENCE (TPEC), 2019,
  • [50] Analysis of Critical Infrastructure Operation Process Including Operating Environment Threats
    Kolowrocki, K.
    Soszynska-Budny, J.
    2016 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2016, : 1703 - 1707