Security management of process plants by a Bayesian network methodology

Book Chapter (2018)
Author(s)

Alessio Misuri (University of Bologna)

Nima Khakzad Rostami (TU Delft - Safety and Security Science)

G. L.L. Reniers (TU Delft - Safety and Security Science)

V. Cozzanni (University of Bologna)

Research Group
Safety and Security Science
Copyright
© 2018 Alessio Misuri, N. Khakzad, G.L.L.M.E. Reniers, Valerio Cozzani
DOI related publication
https://doi.org/10.3303/CET1867042
More Info
expand_more
Publication Year
2018
Language
English
Copyright
© 2018 Alessio Misuri, N. Khakzad, G.L.L.M.E. Reniers, Valerio Cozzani
Research Group
Safety and Security Science
Volume number
67
Pages (from-to)
247-252
ISBN (print)
9788895608648
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Before the tragedy of 9/11, the perception of risk in process plants was mainly focused on accidental events caused by technical failures, human errors or natural events. However, since then, the risk of deliberate actions against process facilities - also known as security risk - has also become a concern. Security risk assessment of engineering systems and infrastructures constitutes a complex task since a significant multitude of technical and socio-political information is needed to reasonably predict the risk of intentional malevolent acts. In the present study, a methodology based on Bayesian network (BN) has been applied to increase the security of critical infrastructures via cost-effective allocation of security measures. Using the probability updating feature of BN, the proposed methodology can be employed to investigate the effect of vulnerabilities on adversaries' preferences while planning security scenarios. Moreover, the proposed methodology is capable of efficiently identifying an optimal defensive strategy given a security scenario (i.e., an attack) through maximizing defenders' expected utility.

Files

042.pdf
(pdf | 1.46 Mb)
License info not available