A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism

被引:183
作者
Apostolakis, GE
Lemon, DM
机构
[1] MIT, Engn Syst Div, Cambridge, MA 02139 USA
[2] MIT, Dept Nucl Sci & Engn, Cambridge, MA 02139 USA
关键词
infrastructures; networks; terrorism; vulnerabilities;
D O I
10.1111/j.1539-6924.2005.00595.x
中图分类号
R1 [预防医学、卫生学];
学科分类号
1004 ; 120402 ;
摘要
The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex and interdependent. Protecting the critical infrastructures from terrorism presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify and prioritize the vulnerabilities in these infrastructures. This article presents a methodology for the identification and prioritization of vulnerabilities in infrastructures. We model the infrastructures as interconnected digraphs and employ graph theory to identify the candidate vulnerable scenarios. These scenarios are screened for the susceptibility of their elements to a terrorist attack, and a prioritized list of vulnerabilities is produced. The prioritization methodology is based on multiattribute utility theory. The impact of losing infrastructure services is evaluated using a value tree that reflects the perceptions and values of the decisionmaker and the relevant stakeholders. These results, which are conditional on a specified threat, are provided to the decisionmaker for use in risk management. The methodology is illustrated through the presentation of a portion of the analysis conducted on the campus of the Massachusetts Institute of Technology.
引用
收藏
页码:361 / 376
页数:16
相关论文
共 27 条
  • [1] Amin M, 2002, Journal of Infrastructure Systems, V8, P67, DOI DOI 10.1061/(ASCE)1076-0342(2002)8:3(67)
  • [2] [Anonymous], 1990, NUREG1150, V2
  • [3] [Anonymous], 2002, NAT STRAT HOM SEC
  • [4] [Anonymous], 2004, J INFRASTRUCT SYST
  • [5] RISK-BASED SPACECRAFT FIRE SAFETY EXPERIMENTS
    APOSTOLAKIS, GE
    CATTON, I
    ISSACCI, F
    JONES, S
    PAUL, M
    PAULOS, T
    PAXTON, K
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 1995, 49 (03) : 275 - 291
  • [6] How useful is quantitative risk assessment?
    Apostolakis, GE
    [J]. RISK ANALYSIS, 2004, 24 (03) : 515 - 520
  • [7] Deliberation: Integrating analytical results into environmental decisions involving multiple stakeholders
    Apostolakis, GE
    Pickett, SE
    [J]. RISK ANALYSIS, 1998, 18 (05) : 621 - 634
  • [8] BALLOCCO G, 2003, P ESREL 2003 EUR SAF
  • [9] Bondy J.A., 1980, Graph Theory with Applications
  • [10] Use of technical expert panels: Applications to probabilistic seismic hazard analysis
    Budnitz, RJ
    Apostolakis, G
    Boore, DM
    Cluff, LS
    Coppersmith, KJ
    Cornell, CA
    Morris, PA
    [J]. RISK ANALYSIS, 1998, 18 (04) : 463 - 469