z-logo
Premium
Risk Analysis of Terrorist Attacks
Author(s) -
Martz Harry F.,
Johnson Mark E.
Publication year - 1987
Publication title -
risk analysis
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.972
H-Index - 130
eISSN - 1539-6924
pISSN - 0272-4332
DOI - 10.1111/j.1539-6924.1987.tb00967.x
Subject(s) - terrorism , computer security , survivability , event tree , guard (computer science) , event (particle physics) , computer science , fault tree analysis , engineering , risk analysis (engineering) , operations research , reliability engineering , geography , business , physics , quantum mechanics , programming language , archaeology
A quantitative probabilistic/systems analysis model is described which is useful for allocating resources to safeguard valuable documents or materials in either a fixed‐site facility or a moving convoy against an overt terrorist attack. The model is also useful for ranking the sensitive areas at a site according to their survivability of a given hypothesized terrorist attempt. To compare various defense strategies and security configurations, the probability of a successful terrorist activity is computed based on event tree models of the site/security configuration. This calculation incorporates a realistic engagement model (in the event a guard force engages the terrorists prior to completion of their objective) and information on barrier penetration times (for example, distribution of the time to defeat a chain link fence or vault door, traverse an open area, and so forth). Two security analyses are described to illustrate the methodology. One example considers a terrorist attack on a convoy transporting a missile from a storage to a launch facility. The second example involves an attack on a munitions storage facility.

This content is not available in your region!

Continue researching here.

Having issues? You can contact us here