Vulnerability and Security Risk Assessment of a Thermal Power Plant Using SVA Technique

The philosophy behind the creation of every organization is bound up with the objectives for each it has been created. There are always factors threatening the continuation of the organization’s activities or even its existence. Some of these factors involve common threats in the security area which should be identified, assessed and controlled through a systematic risk management pattern. In the present study, Security Vulnerability Assessment (SVA) technique and a local version of SVA-Pro software called Joshan-Pro was used to estimate the vulnerability and security risk of a combined cycle power plant. In this Plant, 17 assets were identified and among them, 13 assets with higher priority were entered into Joshan-Pro software for further detailed analysis. Gas oil storage tanks with the vulnerability of 2.33 out of 5 and security risk of 46.60 out of 125 were identified as the most important asset in terms of security and the 230 kV substation with the vulnerability of 0.96 and security risk of 8.64 were labeled as asset with the lowest security risk in the plant. The results showed that Joshan-Pro software, using expert’s opinion, has acceptable capability to determine the security vulnerability of the infrastructures.

[1]  Ilker Akgun,et al.  Fuzzy integrated vulnerability assessment model for critical facilities in combating the terrorism , 2010, Expert Syst. Appl..

[2]  Wout Dullaert,et al.  Managing domino effect-related security of industrial areas , 2008 .

[3]  R. Pielke,et al.  Vulnerability and Risk: Some Thoughts from a Political and Policy Perspective , 2003, Risk analysis : an official publication of the Society for Risk Analysis.

[4]  J. P. Gupta,et al.  Security risk assessment: applying the concepts of fuzzy logic. , 2010, Journal of hazardous materials.

[5]  Faisal Khan,et al.  SVAPP methodology: A predictive security vulnerability assessment modeling method , 2016 .

[6]  Jean-Luc Wybo,et al.  A Threat Assessment Review Planning (TARP) decision flowchart for complex industrial areas , 2013 .

[7]  Genserik Reniers,et al.  Security risk assessment and protection in the chemical and process industry , 2015 .

[8]  Brady Downs The Maritime Security Risk Analysis Model: Applying the Latest Risk Assessment Techniques to Maritime Security , 2007 .

[9]  David A Moore The new risk paradigm for chemical process security and safety. , 2004, Journal of hazardous materials.

[10]  Al Mannai,et al.  Development of a decision support tool to inform resource allocation for critical infrastructure protection in Homeland Security , 2008 .

[11]  Esmaeli Shahrokht Moslem,et al.  URBAN REORGANIZATION WITH FOCUS ON PASSIVE DEFENSE (CASE STUDY: BIRJAND) , 2012 .

[12]  Ashwani Srivastava,et al.  New methodologies for security risk assessment of oil and gas industry , 2010 .

[13]  David A Moore,et al.  Development of a security vulnerability assessment process for the RAMCAP chemical sector. , 2007, Journal of hazardous materials.

[14]  Morteza Yazdani,et al.  Risk Analysis for Critical Infrastructures Using Fuzzy TOPSIS , 2011 .

[15]  J. P. Gupta,et al.  Securing oil and gas infrastructure , 2007 .