Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

1. Protecting Process Industries from Intentional Attacks: The State of the Art

verfasst von : Laobing Zhang, Genserik Reniers

Erschienen in: Game Theory for Managing Security in Chemical Industrial Areas

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Large inventories of hazardous chemicals which can cause catastrophic consequences if released maliciously, the presence of chemical agents which can be stolen and be used either in later terrorist attacks or in making chemical and biochemical weapons, along with the key role of chemical plants in the economy and the public welfare and as an integral element in the supply chain have made the security of chemical plants a great concern especially since 9/11 terrorist attacks in the US. Aside from the importance of chemical plants themselves as potentially attractive targets to terrorist attacks, the usage of chemicals in more than half of the terrorist attacks worldwide further emphasizes the security assessment and management of chemical plants.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Argenti F, Bajpai S, Baybutt P, Cozzani V, Gupta J, Haskins C, et al. Security risk assessment: in the chemical and process industry. Berlin: Walter de Gruyter GmbH & Co KG; 2017. Argenti F, Bajpai S, Baybutt P, Cozzani V, Gupta J, Haskins C, et al. Security risk assessment: in the chemical and process industry. Berlin: Walter de Gruyter GmbH & Co KG; 2017.
3.
Zurück zum Zitat Reniers G, Cozzani V. Domino effects in the process industries: modelling, prevention and managing. Amsterdam: Elsevier B.V; 2013. 1–372 p Reniers G, Cozzani V. Domino effects in the process industries: modelling, prevention and managing. Amsterdam: Elsevier B.V; 2013. 1–372 p
4.
Zurück zum Zitat (DHS) DoHS. National strategy for homeland security. 2002. (DHS) DoHS. National strategy for homeland security. 2002.
5.
Zurück zum Zitat Anastas PT, Hammond DG. Inherent safety at chemical sites: reducing vulnerability to accidents and terrorism through green chemistry. Amsterdam: Elsevier; 2015. Anastas PT, Hammond DG. Inherent safety at chemical sites: reducing vulnerability to accidents and terrorism through green chemistry. Amsterdam: Elsevier; 2015.
6.
Zurück zum Zitat Luft G. Pipeline sabotage is terrorist’s weapon of choice. Pipeline Gas J. 2005;232(2):42–4. Luft G. Pipeline sabotage is terrorist’s weapon of choice. Pipeline Gas J. 2005;232(2):42–4.
7.
Zurück zum Zitat Reniers G, Pavlova Y. Using game theory to improve safety within chemical industrial parks. London: Springer; 2013.CrossRef Reniers G, Pavlova Y. Using game theory to improve safety within chemical industrial parks. London: Springer; 2013.CrossRef
8.
Zurück zum Zitat Reniers G, Khakzad N. Revolutionizing safety and security in the chemical and process industry: applying the CHESS concept. J Integr Secur Sci. 2017;1(1):2–15. Reniers G, Khakzad N. Revolutionizing safety and security in the chemical and process industry: applying the CHESS concept. J Integr Secur Sci. 2017;1(1):2–15.
9.
Zurück zum Zitat Powell R. Defending against terrorist attacks with limited resources. Am Polit Sci Rev. 2007;101(03):527–41.CrossRef Powell R. Defending against terrorist attacks with limited resources. Am Polit Sci Rev. 2007;101(03):527–41.CrossRef
10.
Zurück zum Zitat API. Security risk assessment methodology for the petroleum and petrochemical industries. In: 780 ARP, editor; 2013. API. Security risk assessment methodology for the petroleum and petrochemical industries. In: 780 ARP, editor; 2013.
11.
Zurück zum Zitat Guikema SD, Aven T. Assessing risk from intelligent attacks: a perspective on approaches. Reliab Eng Syst Saf. 2010;95(5):478–83.CrossRef Guikema SD, Aven T. Assessing risk from intelligent attacks: a perspective on approaches. Reliab Eng Syst Saf. 2010;95(5):478–83.CrossRef
12.
Zurück zum Zitat Meyer T, Reniers G. Engineering risk management. Berlin: Walter de Gruyter GmbH & Co KG; 2016. Meyer T, Reniers G. Engineering risk management. Berlin: Walter de Gruyter GmbH & Co KG; 2016.
13.
Zurück zum Zitat Baybutt P. Analytical methods in process safety management and system safety engineering–process hazard analysis. Handb Loss Prev Eng. 2013;1&2:501–53.CrossRef Baybutt P. Analytical methods in process safety management and system safety engineering–process hazard analysis. Handb Loss Prev Eng. 2013;1&2:501–53.CrossRef
14.
Zurück zum Zitat Baybutt P. Assessing risks from threats to process plants: threat and vulnerability analysis. Process Saf Prog. 2002;21(4):269–75.CrossRef Baybutt P. Assessing risks from threats to process plants: threat and vulnerability analysis. Process Saf Prog. 2002;21(4):269–75.CrossRef
15.
Zurück zum Zitat Dunbobbin BR, Medovich TJ, Murphy MC, Ramsey AL. Security vulnerability assessment in the chemical industry. Process Saf Prog. 2004;23(3):214–20.CrossRef Dunbobbin BR, Medovich TJ, Murphy MC, Ramsey AL. Security vulnerability assessment in the chemical industry. Process Saf Prog. 2004;23(3):214–20.CrossRef
16.
Zurück zum Zitat Bajpai S, Gupta J. Site security for chemical process industries. J Loss Prev Process Ind. 2005;18(4):301–9.CrossRef Bajpai S, Gupta J. Site security for chemical process industries. J Loss Prev Process Ind. 2005;18(4):301–9.CrossRef
17.
Zurück zum Zitat Bajpai S, Gupta J. Securing oil and gas infrastructure. J Pet Sci Eng. 2007;55(1–2):174–86.CrossRef Bajpai S, Gupta J. Securing oil and gas infrastructure. J Pet Sci Eng. 2007;55(1–2):174–86.CrossRef
18.
Zurück zum Zitat Garcia ML. Vulnerability assessment of physical protection systems. Amsterdam: Butterworth-Heinemann; 2005. Garcia ML. Vulnerability assessment of physical protection systems. Amsterdam: Butterworth-Heinemann; 2005.
19.
Zurück zum Zitat Nolan DP. Safety and security review for the process industries: application of HAZOP, PHA, What-IF and SVA Reviews. Waltham: Elsevier; 2014.CrossRef Nolan DP. Safety and security review for the process industries: application of HAZOP, PHA, What-IF and SVA Reviews. Waltham: Elsevier; 2014.CrossRef
20.
Zurück zum Zitat Baybutt P. Security vulnerability analysis: protecting process plants from physical and cyber threats. In: Reniers G, Khakzad N, Gelder PV, editors. Security risk assessment: in the chemical and process industry, vol. 1. Berlin: Walter de Gruyter GmbH & Co KG; 2017. Baybutt P. Security vulnerability analysis: protecting process plants from physical and cyber threats. In: Reniers G, Khakzad N, Gelder PV, editors. Security risk assessment: in the chemical and process industry, vol. 1. Berlin: Walter de Gruyter GmbH & Co KG; 2017.
21.
Zurück zum Zitat Kaplan S. The words of risk analysis. Risk Anal. 1997;17(4):407–17.CrossRef Kaplan S. The words of risk analysis. Risk Anal. 1997;17(4):407–17.CrossRef
22.
Zurück zum Zitat Baybutt P. Get creative with process safety management. Chem Eng Prog. 2017;113(4):58–60. Baybutt P. Get creative with process safety management. Chem Eng Prog. 2017;113(4):58–60.
23.
Zurück zum Zitat Baybutt P. A framework for critical thinking in process safety management. Process Saf Prog. 2016;35(4):337–40.CrossRef Baybutt P. A framework for critical thinking in process safety management. Process Saf Prog. 2016;35(4):337–40.CrossRef
24.
Zurück zum Zitat Moore DT. Critical thinking and intelligence analysis. Washington, DC: National Defense Intelligence Coll; 2007.CrossRef Moore DT. Critical thinking and intelligence analysis. Washington, DC: National Defense Intelligence Coll; 2007.CrossRef
25.
Zurück zum Zitat Baybutt P. Cognitive biases in process hazard analysis. J Loss Prev Process Ind. 2016;43:372–7.CrossRef Baybutt P. Cognitive biases in process hazard analysis. J Loss Prev Process Ind. 2016;43:372–7.CrossRef
26.
Zurück zum Zitat Montibeller G, Winterfeldt D. Cognitive and motivational biases in decision and risk analysis. Risk Anal. 2015;35(7):1230–51.CrossRef Montibeller G, Winterfeldt D. Cognitive and motivational biases in decision and risk analysis. Risk Anal. 2015;35(7):1230–51.CrossRef
27.
Zurück zum Zitat Cox LAT, Babayev D, Huber W. Some limitations of qualitative risk rating systems. Risk Anal. 2005;25(3):651–62.CrossRef Cox LAT, Babayev D, Huber W. Some limitations of qualitative risk rating systems. Risk Anal. 2005;25(3):651–62.CrossRef
28.
Zurück zum Zitat Baybutt P. Designing risk matrices to avoid risk ranking reversal errors. Process Saf Prog. 2016;35(1):41–6.CrossRef Baybutt P. Designing risk matrices to avoid risk ranking reversal errors. Process Saf Prog. 2016;35(1):41–6.CrossRef
29.
Zurück zum Zitat Cox LAT Jr. Some limitations of “Risk = Threat × Vulnerability × Consequence” for risk analysis of terrorist attacks. Risk Anal. 2008;28(6):1749–61.CrossRef Cox LAT Jr. Some limitations of “Risk = Threat × Vulnerability × Consequence” for risk analysis of terrorist attacks. Risk Anal. 2008;28(6):1749–61.CrossRef
30.
Zurück zum Zitat Zhang L, Reniers G, Chen B, Qiu X. Integrating the API SRA methodology and game theory for improving chemical plant protection. J Loss Prev Process Ind. 2018;51(Supplement C):8–16.CrossRef Zhang L, Reniers G, Chen B, Qiu X. Integrating the API SRA methodology and game theory for improving chemical plant protection. J Loss Prev Process Ind. 2018;51(Supplement C):8–16.CrossRef
31.
Zurück zum Zitat Curzio AQ, Fortis M. Complexity and industrial clusters: dynamics and models in theory and practice. Heidelberg: Springer; 2012. Curzio AQ, Fortis M. Complexity and industrial clusters: dynamics and models in theory and practice. Heidelberg: Springer; 2012.
32.
Zurück zum Zitat Gulak M, Kun U, Koday Z, Koday S. Preventing terrorist attacks to critical. Underst Respond Terrorism Phenom A Multidimens Perspect. 2007;21:298. Gulak M, Kun U, Koday Z, Koday S. Preventing terrorist attacks to critical. Underst Respond Terrorism Phenom A Multidimens Perspect. 2007;21:298.
33.
Zurück zum Zitat Reniers GLL. Multi-plant safety and security management in the chemical and process industries. Weinheim: Wiley-VCH; 2010.CrossRef Reniers GLL. Multi-plant safety and security management in the chemical and process industries. Weinheim: Wiley-VCH; 2010.CrossRef
34.
Zurück zum Zitat Reniers G, Soudan K. A game-theoretical approach for reciprocal security-related prevention investment decisions. Reliab Eng Syst Saf. 2010;95(1):1–9.CrossRef Reniers G, Soudan K. A game-theoretical approach for reciprocal security-related prevention investment decisions. Reliab Eng Syst Saf. 2010;95(1):1–9.CrossRef
35.
Zurück zum Zitat Reniers GLL, Sörensen K, Khan F, Amyotte P. Resilience of chemical industrial areas through attenuation-based security. Reliab Eng Syst Saf. 2014;131:94–101.CrossRef Reniers GLL, Sörensen K, Khan F, Amyotte P. Resilience of chemical industrial areas through attenuation-based security. Reliab Eng Syst Saf. 2014;131:94–101.CrossRef
36.
Zurück zum Zitat Tambe M. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge: Cambridge University Press; 2011.CrossRef Tambe M. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge: Cambridge University Press; 2011.CrossRef
37.
Zurück zum Zitat Bier VM, Azaiez MN. Game theoretic risk analysis of security threats. Dordrecht: Springer; 2008. Bier VM, Azaiez MN. Game theoretic risk analysis of security threats. Dordrecht: Springer; 2008.
38.
Zurück zum Zitat Hall JR Jr. The elephant in the room is called game theory. Risk Anal. 2009;29(8):1061.CrossRef Hall JR Jr. The elephant in the room is called game theory. Risk Anal. 2009;29(8):1061.CrossRef
Metadaten
Titel
Protecting Process Industries from Intentional Attacks: The State of the Art
verfasst von
Laobing Zhang
Genserik Reniers
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-92618-6_1