Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Security Vulnerability Analysis

Step 3 Decide Which Approach to Vulnerability Analysis to Use. Security vulnerability analysis (SVA) is the activity of identifying how potential terrorists can breach security at your site in order to impact an asset and cause a terrorist event. In this context, asset can mean a piece of equipment, a store of product, a key building, a computer system, a person, or anything else of importance to your company or organization. Security is vulnerable when three factors coexist (a) an [Pg.301]

All vulnerability analysis methods fall within a spectrum ranging from qualitative ( Asset-based ) to quantitative ( Scenario-based ). In general, one will choose an SVA method on the scenario-based end of the spectrum when [Pg.302]

By contrast, one will choose an asset-based SVA when the consequences are relatively less or when considerable experience exists for analyzing the asset. [Pg.302]

For example, the U.S. Secret Service uses an exhaustive scenario-based approach to protect the President of the United States. Likewise, the nuclear industry uses a rigorous scenario-based approach. In the former case, the symbolic value of a U.S. President makes him or her a very attractive target. In the latter, the political [Pg.302]

ACC Tier 4 SVA American Asset-based approach www.responsiblecare [Pg.302]


Synthetic Organic Chemical Manufacturers Association, Inc. (SOCMA), Manual on Chemical Site Security Vulnerability Analysis Methodology and Model, 2002. [Pg.106]

A challenge for security vulnerability analysis is that the accurate prediction of the frequency and location of terrorist acts is not considered credible. As such, the analyst has a choice of assuming a frequency of a certain attack or assuming the attack frequency is 1, thereby focusing solely on the conditional likelihood of success of the adversary who attempts an attack. While the latter approach provides a baseline for making decisions about vulnerability, it does not fully... [Pg.107]

Security Vulnerability Analysis (SVA)—the process of determirring the likelihood of an adversary successfully exploiting a vrtlnerability and the... [Pg.112]

T TDG TNO TRM TSA TSVA TWIG Threat Transportation of Dangerous Goods Act Netherlands Organization for Applied Scientific Research Transportation Risk Management Transportation Security Administration Transportation Security Vulnerability Analysis Transportation Worker Identification Credential... [Pg.189]

Transportation Security Vulnerability Analysis (TSVA) A modified SVA proeess specifically designed to account for specific threats, eonsequenees, vulnerabilities, risks, and secnrity conntermeasures of transportation aetivities ineluding hazardous materials in transit. [Pg.197]

The use of force or violence against individnals, organizations, or property for the purposes of intimidation, coercion, or ransom by misguided extremist individuals or groups. The individuals or organizations in which the force or violence is inflected upon are usually not directly involved in the concerns and are typically affected by chance. Threats are also used to create fear in the public and to convince citizens that their government is powerless to prevent their actions, and to get immediate pnbHcity for their causes. Terrorism is a violation of national and international laws. See also Security Vulnerability Analysis (SVA). [Pg.286]

The newly revised Chapter 13 addresses security issues in emergency departments, pediatric locations, infant care units, medication storage locations, cUnical labs, forensic patient treatments areas, and behavioral units. The chapter also addresses communications, data infrastructure, and security of medical/health records. Chapter 13 covers media relations, crowd control, employee practices, and security operations. Facilities must conduct a security vulnerability analysis and planning for the protection of people and resources beyond a disaster event. Security education should address customer relations, emergency procedures, use of force issues, importance of effective de-escalation of tense tactics, and restraint usage. The new code reqnires the development of policies, plans, and procedures to address hostage situations, bomb threats, workplace violence, disorderly conduct, and restraining order policies. [Pg.272]

Phifer, R. W. (2007). Security vulnerability analysis for laboratories and small chemical facilities. Journal of Chemical Health Safety, 12-14. [Pg.107]

Security Vulnerability Analysis (SVA)—In April 2007, the US Department of Homeland Security (DHS) issued the Chemical Facility... [Pg.143]

Many companies conduct a Security Vulnerability Analysis (SVA) in order to identify areas where they may be the most vulnerable, and to decide on how to improve security. An SVA is similar in many ways to a PHA. [Pg.337]


See other pages where Security Vulnerability Analysis is mentioned: [Pg.301]    [Pg.302]    [Pg.302]    [Pg.113]    [Pg.189]    [Pg.196]    [Pg.271]    [Pg.271]    [Pg.30]    [Pg.97]    [Pg.439]   
See also in sourсe #XX -- [ Pg.30 ]

See also in sourсe #XX -- [ Pg.143 ]

See also in sourсe #XX -- [ Pg.337 , Pg.338 ]




SEARCH



Vulnerability

Vulnerability analysis

© 2024 chempedia.info