E-Book, Englisch, 229 Seiten
E-Book, Englisch, 229 Seiten
ISBN: 978-1-4665-5751-2
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Developed at Sandia National Labs, the authors’ analytical approach and methodology enables decision-makers and security experts to perform and utilize risk assessments in a manner that extends beyond the theoretical to practical application. These protocols leverage expertise in modeling dependencies—optimizing system resiliency for effective physical protection system design and consequence mitigation.
The book begins by focusing on the design of protection strategies to enhance the robustness of the infrastructure components. The authors present risk assessment tools and necessary metrics to offer guidance to decision-makers in applying sometimes limited resources to reduce risk and ensure operational resiliency.
Our critical infrastructure is vast and made up of many component parts. In many cases, it may not be practical or affordable to secure every infrastructure node. For years, experts—as a part of the risk assessment process—have tried to better identify and distinguish higher from lower risks through risk segmentation. In the second section of the book, the authors present examples to distinguish between high and low risks and corresponding protection measures. In some cases, protection measures do not prevent undesired events from occurring. In others, protection of all infrastructure components is not feasible. As such, this section describes how to evaluate and design resilience in these unique scenarios to manage costs while most effectively ensuring infrastructure system protection.
With insight from the authors’ decades of experience, this book provides a high-level, practical analytical framework that public and private sector owners and operators of critical infrastructure can use to better understand and evaluate infrastructure security strategies and policies. Strengthening the entire homeland security enterprise, the book presents a significant contribution to the science of critical infrastructure protection and resilience.
Zielgruppe
Homeland security professionals, corporate security managers, security system designers, security system integrators, security consultants, physical security and risk professionals, facility managers, and managers of critical infrastructure and public and private utilities.
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit
- Technische Wissenschaften Bauingenieurwesen Haustechnik, Gebäudeautomatisierung
- Technische Wissenschaften Technik Allgemein Technische Zuverlässigkeit, Sicherheitstechnik
- Wirtschaftswissenschaften Wirtschaftssektoren & Branchen Dienstleistungssektor & Branchen Sicherheitsgewerbe
- Wirtschaftswissenschaften Betriebswirtschaft Management Risikomanagement
Weitere Infos & Material
SECURITY RISK ASSESSMENT
Introduction to Security Risk Assessment
Security Risk Assessment
Protection System Robustness
Security System Resiliency
System Approach for Security Risk Assessment
Determine Undesired Events, Associated Critical Assets,
and Available Resources
Threat Analysis
Assess Likelihood of Initiating Event
Estimate Protection System Effectiveness
Assess Consequences for Undesired Event
Estimate Security Risk
Upgrade the Protection System to Be Robust against Undesired Event
Upgrade Security System to Be Resilient for Undesired Event
Undesired Events, Associated Critical Assets, and Available Resources
Critical Assets
Logic Model
Threat Analysis
Malevolent Threats
Type of Adversary
Adversary Capability
Design Basis Threat
Natural Hazards
Hurricane
Earthquake
Tornado
Flood
Accidents
Likelihood of Initiating Events
Malevolent Threat
Outsider Threat
Insider Threat
Natural Hazard Threat
Accident Threat
Assess Consequences and Responses for Undesired Event
Reference Table for Consequences
Estimating Consequence Level for Undesired Events
Assessment of Protection System Effectiveness
Assessment of Protection System Effectiveness for Malevolent Threat
Adversary Scenarios
Effective Physical Protection System for the Malevolent Threat
Physical Protection System Effectiveness Assessment
Physical Protection System Effectiveness Assessment—Example
Protection System Effectiveness against Blast Attacks
Protection System Effectiveness for Blast Attacks Assessment—Example
Mitigation of the Insider Threat
Cyber Protection System Effectiveness
Cyber Functions
Cyber Protection System Effectiveness Assessment—Example
Effectiveness for Natural Hazards
Protection System Effectiveness Assessment for Natural
Hazards—Example
Protection System Effectiveness for Accidents
Protection System Effectiveness Assessment for Accidents—Example
Estimate Security Risk
System Approach for Security Risk Assessment
Determine Undesired Events, Associated Critical Assets, and Available Resources
Threat Analysis
Assess Likelihood of Initiating Event
Estimate Protection System Effectiveness
Assess Consequences for Undesired Event
Estimate Security Risk
Upgrade Protection System to Be Robust against Undesired Event
Upgrade Security System to Be Resilient for Undesired Event
EVALUATION AND DESIGN OF RESILIENT SYSTEMS
Motivating Infrastructure Resilience Analysis
Current State of Resilience Assessment
Definitions of Resilience
Domains
Assessment Processes
Structural Resilience Assessment Methodologies
Performance-Based Measurement
Hybrid Approaches
Gaps and Limitations
Infrastructure Resilience Analysis Methodology
Definition of Resilience
Measurement of Resilience Costs
Systemic Impact
Total Recovery Effort
Resilience Cost Calculation
Use and Interpretation of Recovery-Dependent Resilience
Costs and Optimal Resilience Costs Quantities
Additional Notes on Calculation of Resilience Costs
Qualitative Structural Analysis
Absorptive Capacity
Adaptive Capacity
Restorative Capacity
Additional Notes on Resilience Capacities
Applying the Infrastructure Resilience Analysis Methodology
Case Studies Using the Infrastructure Resilience Analysis Framework
Qualitative Resilience Analysis Case Study
Define Systems
Define Scenario
Perform Structural Analysis
Analysis Conclusions
Quantitative Resilience Analysis Case Study
Define Systems
Define Scenario
Define Metrics and Obtain Data
Calculate Resilience Costs
Perform Structural Analysis
Case Study on Optimizing Resilient Recovery Strategies
Define Systems
Define Scenario
Define Metrics
Obtain Data and Calculate Resilience Costs
Future Directions
APPENDIX A: EXAMPLE USE OF FAULT TREES TO IDENTIFY CRITICAL ASSETS
APPENDIX B: PHYSICAL PROTECTION FEATURES PERFORMANCE DATA
INDEX