|
|
xiii | |
|
|
xv | |
Foreword |
|
xvii | |
Acknowledgments |
|
xxi | |
About the Authors |
|
xxiii | |
Acronyms and Abbreviations |
|
xxv | |
|
Section I SECURITY RISK ASSESSMENT |
|
|
|
1 Introduction to Security Risk Assessment |
|
|
3 | (8) |
|
|
5 | (1) |
|
Protection System Robustness |
|
|
6 | (1) |
|
Security System Resiliency |
|
|
6 | (1) |
|
System Approach for Security Risk Assessment |
|
|
7 | (3) |
|
Determine Undesired Events, Associated Critical Assets, and Available Resources |
|
|
8 | (1) |
|
|
8 | (1) |
|
Assess Likelihood of Initiating Event |
|
|
8 | (1) |
|
Estimate Protection System Effectiveness |
|
|
9 | (1) |
|
Assess Consequences for Undesired Event |
|
|
9 | (1) |
|
|
9 | (1) |
|
Upgrade the Protection System to Be Robust against Undesired Event |
|
|
10 | (1) |
|
Upgrade Security System to Be Resilient for Undesired Event |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
2 Undesired Events, Associated Critical Assets, and Available Resources |
|
|
11 | (8) |
|
|
11 | (5) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (3) |
|
|
16 | (1) |
|
|
16 | (1) |
|
|
17 | (2) |
|
|
19 | (12) |
|
|
19 | (7) |
|
|
23 | (1) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
26 | (2) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
4 Likelihood of Initiating Events |
|
|
31 | (8) |
|
|
31 | (5) |
|
|
32 | (2) |
|
|
34 | (2) |
|
|
36 | (1) |
|
|
36 | (2) |
|
|
38 | (1) |
|
|
38 | (1) |
|
5 Assess Consequences and Responses for Undesired Event |
|
|
39 | (4) |
|
Reference Table for Consequences |
|
|
39 | (2) |
|
Estimating Consequence Level for Undesired Events |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
6 Assessment of Protection System Effectiveness |
|
|
43 | (20) |
|
Assessment of Protection System Effectiveness for Malevolent Threat |
|
|
43 | (5) |
|
|
44 | (2) |
|
Effective Physical Protection System for the Malevolent Threat |
|
|
46 | (2) |
|
Physical Protection System Effectiveness Assessment |
|
|
48 | (1) |
|
|
49 | (3) |
|
Protection System Effectiveness against Blast Attacks |
|
|
52 | (1) |
|
|
52 | (1) |
|
Mitigation of the Insider Threat |
|
|
53 | (2) |
|
Cyber Protection System Effectiveness |
|
|
55 | (3) |
|
|
56 | (1) |
|
|
57 | (1) |
|
Effectiveness for Natural Hazards |
|
|
58 | (2) |
|
Protection System Effectiveness Assessment Example |
|
|
59 | (1) |
|
Protection System Effectiveness for Accidents |
|
|
60 | (2) |
|
|
60 | (2) |
|
|
62 | (1) |
|
|
62 | (1) |
|
|
63 | (12) |
|
System Approach for Security Risk Assessment |
|
|
63 | (5) |
|
Determine Undesired Events, Associated Critical Assets, and Available Resources |
|
|
64 | (1) |
|
|
65 | (1) |
|
Assess Likelihood of Initiating Event |
|
|
65 | (1) |
|
Estimate Protection System Effectiveness |
|
|
65 | (2) |
|
Assess Consequences for Undesired Event |
|
|
67 | (1) |
|
|
68 | (2) |
|
Upgrade Protection System to Be Robust against Undesired Event |
|
|
70 | (2) |
|
Upgrade Security System to Be Resilient for Undesired Event |
|
|
72 | (1) |
|
|
72 | (3) |
|
Section II EVALUATION AND DESIGN OF RESILIENT SYSTEMS |
|
|
|
8 Motivating Infrastructure Resilience Analysis |
|
|
75 | (4) |
|
|
78 | (1) |
|
9 Current State of Resilience Assessment |
|
|
79 | (26) |
|
Definitions of Resilience |
|
|
80 | (4) |
|
|
84 | (1) |
|
|
85 | (14) |
|
Structural Resilience Assessment Methodologies |
|
|
86 | (1) |
|
|
86 | (1) |
|
Quantitative and Semiquantitative Indexes |
|
|
87 | (2) |
|
Performance-Based Measurement |
|
|
89 | (1) |
|
|
90 | (1) |
|
|
91 | (2) |
|
|
93 | (3) |
|
|
96 | (3) |
|
|
99 | (3) |
|
|
102 | (1) |
|
|
102 | (3) |
|
10 Infrastructure Resilience Analysis Methodology |
|
|
105 | (26) |
|
|
107 | (1) |
|
Measurement of Resilience Costs |
|
|
108 | (9) |
|
|
109 | (2) |
|
|
111 | (1) |
|
Resilience Cost Calculation |
|
|
112 | (2) |
|
Use and Interpretation of Recovery-Dependent Resilience Costs and Optimal Resilience Costs Quantities |
|
|
114 | (1) |
|
Additional Notes on Calculation of Resilience Costs |
|
|
115 | (1) |
|
Qualitative Structural Analysis |
|
|
116 | (1) |
|
|
117 | (11) |
|
|
119 | (2) |
|
|
121 | (2) |
|
Additional Notes on Resilience Capacities |
|
|
123 | (1) |
|
Applying the Infrastructure Resilience Analysis Methodology |
|
|
124 | (4) |
|
|
128 | (1) |
|
|
129 | (1) |
|
|
129 | (2) |
|
11 Case Studies Using the Infrastructure Resilience Analysis Framework |
|
|
131 | (40) |
|
Qualitative Resilience Analysis Case Study |
|
|
132 | (6) |
|
|
132 | (1) |
|
|
133 | (1) |
|
Perform Structural Analysis |
|
|
134 | (4) |
|
|
138 | (1) |
|
Quantitative Resilience Analysis Case Study |
|
|
138 | (14) |
|
|
139 | (1) |
|
|
139 | (1) |
|
Define Metrics and Obtain Data |
|
|
140 | (1) |
|
|
140 | (2) |
|
|
142 | (4) |
|
Calculate Resilience Costs |
|
|
143 | (3) |
|
Perform Structural Analysis |
|
|
146 | (1) |
|
|
146 | (2) |
|
|
148 | (2) |
|
|
150 | (1) |
|
|
151 | (1) |
|
Case Study on Optimizing Resilient Recovery Strategies |
|
|
152 | (14) |
|
|
152 | (1) |
|
|
153 | (2) |
|
|
155 | (2) |
|
Obtain Data and Calculate Resilience Costs |
|
|
157 | (1) |
|
The Rail Network Analysis System |
|
|
158 | (2) |
|
|
160 | (1) |
|
|
161 | (4) |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
168 | (3) |
|
|
171 | (4) |
|
|
173 | (2) |
Appendix A Example Use of Fault Trees to Identify Critical Assets |
|
175 | (4) |
Appendix B Physical Protection Features Performance Data |
|
179 | (14) |
Index |
|
193 | |