z-logo
Premium
Assessing risks from threats to process plants: Threat and vulnerability analysis
Author(s) -
Baybutt Paul
Publication year - 2002
Publication title -
process safety progress
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.378
H-Index - 40
eISSN - 1547-5913
pISSN - 1066-8527
DOI - 10.1002/prs.680210403
Subject(s) - brainstorming , risk analysis (engineering) , terrorism , vulnerability (computing) , process (computing) , computer security , vulnerability assessment , threat assessment , risk management , countermeasure , variety (cybernetics) , risk assessment , security management , threat , process safety , business , engineering , computer science , operations management , work in process , information security , security service , network security policy , marketing , political science , psychological resilience , psychotherapist , operating system , psychology , artificial intelligence , law , aerospace engineering , finance
Process security management addresses threats from terrorist and criminal acts against plants that may result in the release of hazardous materials. The risk of such threats must be assessed to determine if existing security measures and safeguards are adequate or need improvement. Risk assessment is the heart of a process security program. Process plants need straight forward and easily applied methods to assess security risks using techniques that can be employed in a variety of situations and at varying levels of detail. This paper describes an approach that accomplishes these objectives. Threat analysis is the first step. It is used to identify the sources and types of threats and their likelihood. The approach described in this paper involves the consideration of motivations and capabilities of adversaries and the rating of facility security factors to develop a threat profile. Once specific threats have been identified, process vulnerability analysis is used to identify threat scenarios, i.e., how threats could be realized. Plants and processes are divided into sectors, and each credible threat within each sector is considered. Vulnerabilities are identified by brainstorming the ways barriers can be penetrated and process containment breached. Checklists are used to guide the brainstorming, and scenario consequences are recorded. Existing security measures and safeguards are listed, and any recommendations for improvements to reduce the likelihood and severity of terrorist and criminal acts are made for consideration by management based on the nature of the threat, process vulnerabilities, possible consequences, and existing security measures and safeguards. Risk rankings are performed as part of the analyses.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here