A barrier based methodology to assess site security risk

The recent attacks on petroleum plants in various countries such as Algeria, Nigeria, and Iraq have greatly changed the risk mindset of the chemical industry (Johnson and Gilbert, 2013; Nordland and Al-Sahy, 2014). Risk assessments and management traditionally are conducted on unintended (safety rel...

Full description

Bibliographic Details
Published in:All Days
Main Authors: Van Staalduinen, M, Khan, FI
Format: Conference Object
Language:English
Published: Society of Petroleum Engineers 2015
Subjects:
Online Access:https://www.onepetro.org/conference-paper/SPE-173561-MS
https://doi.org/10.2118/173561-MS
http://ecite.utas.edu.au/120653
id ftunivtasecite:oai:ecite.utas.edu.au:120653
record_format openpolar
spelling ftunivtasecite:oai:ecite.utas.edu.au:120653 2023-05-15T17:24:42+02:00 A barrier based methodology to assess site security risk Van Staalduinen, M Khan, FI 2015 https://www.onepetro.org/conference-paper/SPE-173561-MS https://doi.org/10.2118/173561-MS http://ecite.utas.edu.au/120653 en eng Society of Petroleum Engineers http://dx.doi.org/10.2118/173561-MS Van Staalduinen, M and Khan, FI, A barrier based methodology to assess site security risk, Proceedings of the Society of Petroleum Engineers - SPE E and P Health, Safety, Security and Environmental Conference - Americas 2015, 16-18 March 2015, Denver, USA, pp. 605-629. ISBN 9781510802452 (2015) [Non Refereed Conference Paper] http://ecite.utas.edu.au/120653 Engineering Interdisciplinary Engineering Risk Engineering (excl. Earthquake Engineering) Non Refereed Conference Paper NonPeerReviewed 2015 ftunivtasecite https://doi.org/10.2118/173561-MS 2019-12-13T22:19:41Z The recent attacks on petroleum plants in various countries such as Algeria, Nigeria, and Iraq have greatly changed the risk mindset of the chemical industry (Johnson and Gilbert, 2013; Nordland and Al-Sahy, 2014). Risk assessments and management traditionally are conducted on unintended (safety related) incidents and not on intentional acts. These intentional acts could either be from an internal or external source. This paper extends the probabilistic risk assessment methodology (generally focus on safety unintended) to the security facet (focusing on intended incidents) of a processing facility. The methodology is based on the barrier approach. Five security barriers are proposed throughout the facility to help deter an attack. These security barriers are external, internal, interior, critical, and the fail-safe barrier, which are implemented at various stages of a plant with varying objectives. For example, the fail-safe barrier aims to bring the plant to safe shutdown mode, once it observes breach of the barrier. Breach of each barrier is modeled using fault tree approach. A number of monitoring parameters are proposed to track the effectiveness of the barrier, which are modeled as basic events in the fault tree. The occurrence of each basic event is modeled using two failure modes: i) natural, and ii) forced failure. Conditional probability with soft computing theory is used to model occurrence probability. The proposed methodology also takes into account effectiveness of the management, and political parameters in an impeding attack. In addition, the fault trees modeled are mapped into respective Bayesian Networks. Bayesian networks allow for manipulation of the conditional probability table. There are three relaxation assumptions that manipulate the conditional probability table that is explored in this paper. In order to eliminate uncertainty developed in the data, an updating mechanism is used along with a predictive component to make the model dynamic. This is significant as the model can be become dynamic to reflect any changes that may have occurred. Finally, a case study of a typical processing facility is presented to demonstrate the effectiveness of the model and to indicate areas of further improvement. This paper aspires to bring awareness to security risk assessments and the need to create a database for security related failures. Conference Object Nordland Nordland Nordland eCite UTAS (University of Tasmania) All Days
institution Open Polar
collection eCite UTAS (University of Tasmania)
op_collection_id ftunivtasecite
language English
topic Engineering
Interdisciplinary Engineering
Risk Engineering (excl. Earthquake Engineering)
spellingShingle Engineering
Interdisciplinary Engineering
Risk Engineering (excl. Earthquake Engineering)
Van Staalduinen, M
Khan, FI
A barrier based methodology to assess site security risk
topic_facet Engineering
Interdisciplinary Engineering
Risk Engineering (excl. Earthquake Engineering)
description The recent attacks on petroleum plants in various countries such as Algeria, Nigeria, and Iraq have greatly changed the risk mindset of the chemical industry (Johnson and Gilbert, 2013; Nordland and Al-Sahy, 2014). Risk assessments and management traditionally are conducted on unintended (safety related) incidents and not on intentional acts. These intentional acts could either be from an internal or external source. This paper extends the probabilistic risk assessment methodology (generally focus on safety unintended) to the security facet (focusing on intended incidents) of a processing facility. The methodology is based on the barrier approach. Five security barriers are proposed throughout the facility to help deter an attack. These security barriers are external, internal, interior, critical, and the fail-safe barrier, which are implemented at various stages of a plant with varying objectives. For example, the fail-safe barrier aims to bring the plant to safe shutdown mode, once it observes breach of the barrier. Breach of each barrier is modeled using fault tree approach. A number of monitoring parameters are proposed to track the effectiveness of the barrier, which are modeled as basic events in the fault tree. The occurrence of each basic event is modeled using two failure modes: i) natural, and ii) forced failure. Conditional probability with soft computing theory is used to model occurrence probability. The proposed methodology also takes into account effectiveness of the management, and political parameters in an impeding attack. In addition, the fault trees modeled are mapped into respective Bayesian Networks. Bayesian networks allow for manipulation of the conditional probability table. There are three relaxation assumptions that manipulate the conditional probability table that is explored in this paper. In order to eliminate uncertainty developed in the data, an updating mechanism is used along with a predictive component to make the model dynamic. This is significant as the model can be become dynamic to reflect any changes that may have occurred. Finally, a case study of a typical processing facility is presented to demonstrate the effectiveness of the model and to indicate areas of further improvement. This paper aspires to bring awareness to security risk assessments and the need to create a database for security related failures.
format Conference Object
author Van Staalduinen, M
Khan, FI
author_facet Van Staalduinen, M
Khan, FI
author_sort Van Staalduinen, M
title A barrier based methodology to assess site security risk
title_short A barrier based methodology to assess site security risk
title_full A barrier based methodology to assess site security risk
title_fullStr A barrier based methodology to assess site security risk
title_full_unstemmed A barrier based methodology to assess site security risk
title_sort barrier based methodology to assess site security risk
publisher Society of Petroleum Engineers
publishDate 2015
url https://www.onepetro.org/conference-paper/SPE-173561-MS
https://doi.org/10.2118/173561-MS
http://ecite.utas.edu.au/120653
genre Nordland
Nordland
Nordland
genre_facet Nordland
Nordland
Nordland
op_relation http://dx.doi.org/10.2118/173561-MS
Van Staalduinen, M and Khan, FI, A barrier based methodology to assess site security risk, Proceedings of the Society of Petroleum Engineers - SPE E and P Health, Safety, Security and Environmental Conference - Americas 2015, 16-18 March 2015, Denver, USA, pp. 605-629. ISBN 9781510802452 (2015) [Non Refereed Conference Paper]
http://ecite.utas.edu.au/120653
op_doi https://doi.org/10.2118/173561-MS
container_title All Days
_version_ 1766115821498662912