Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Vulnerability analysis

Vulnerability analysis identifies areas in tlie community tliat may be affected or [Pg.500]

The extent of the mlnerable zones (i.e., an estimation of tlie area tliat may be affected in a significant way as a result of a spill or release of a known quantity of a specific chemical under defined conditions) [Pg.500]

Tlie population, in tenns of nmnbers, density, and types of individuals (e.g., facility employees neigliborliood residents people in hospitals, schools, nursing homes, prisons, day care centers) Uiat could be witliin a vulnerable zone tlie private and public property (e.g., critical facilities, homes, schools, hospitals, businesses, offices) tliat may be damaged, including essential support [Pg.500]

TABLE 17.5.1 Suggested Criticality Rankings Based on Aerospace Hazard Classification [Pg.501]

TABLE 17.5.2 Suggested Scale for Criticality Ranking for a Qualitative  [Pg.501]

Vulnerability analysis identifies areas in tlie community tliat may be affected or exposed, indviduals in tlie community who may be subject to injury or death from certain specific hazardous materials, and what facilities, property, or eiivironment may be susceptible to damage should a hazardous materials release occur. A comprehensive vulnerability analysis provides information on  [Pg.500]


Section 5. Emergency Response Planning (assembling hazards, vulnerability analysis, and risk analysis information). [Pg.268]

Perhaps the key to detcrnuiiiiig die consequences of an accident is die study of accident mininiization/prcvendon. This topic receives extensive treatment in Section 17.2. The estimation (not calculadon) of consequences is treated in Section 17.3, which is followed by evacuation procedures (Section 17.4). The next section e.xaniiiies failure modes, effects and critical analysis (FMECA). The cluipter concludes with vulnerability analysis (Section 17.6) and event tree analysis (Section 17.7). [Pg.484]

Synthetic Organic Chemical Manufacturers Association, Inc. (SOCMA), Manual on Chemical Site Security Vulnerability Analysis Methodology and Model, 2002. [Pg.106]

A challenge for security vulnerability analysis is that the accurate prediction of the frequency and location of terrorist acts is not considered credible. As such, the analyst has a choice of assuming a frequency of a certain attack or assuming the attack frequency is 1, thereby focusing solely on the conditional likelihood of success of the adversary who attempts an attack. While the latter approach provides a baseline for making decisions about vulnerability, it does not fully... [Pg.107]

Target vulnerability analysis is one element in a much more comprehensive analysis which should be conducted when evaluating the effectiveness of munitions or effectiveness of methods of vulnerability reduction. The more comprehensive analysis can be termed system analysis . System analysis applied to munitions effectiveness should help answer one or more of the following questions ... [Pg.299]

This brief discussion of system analysis is included here to show that target vulnerability analysis is only one element of a much more comprehensive analysis. It should not be considered a complete review of system analysis applied to studies of munition effectiveness... [Pg.300]

Target vulnerability analysis has a role in the assessment or estimation of munition effectiveness which can be illustrated by indicating how target vulnerability analysis enters the broader role of system analysis. The reader is referred back to the 8 questions posed above under Systems Analysis. Target vulnerability analysis will provide the essential input information needed to answer these questions. The answer to Question 8 is important because survivability of our own equipment can probably best be improved by identifying those components of any military target which contribute most to... [Pg.300]

This brief discussion highlights the role of target vulnerability analysis in the larger and more complex process of system analysis related to munition effectiveness or improvement in survivability of our own equipment. But, although target vulnerability analysis is only an element in the more complex scheme of things, it in itself is quite complex and must in turn assume or accept inputs from other sophisticated disciplines such as terminal ballistics and mathematical theory of statistics. The structure of target vulnerability analysis therefore is discussed next... [Pg.300]

Target vulnerability analysis is a complex process, with many possible iterations or interactions between steps in or elements of the process. One possible division between major elements of such analysis and some interactions are shown schematically in Fig 2... [Pg.300]

Although they are not directly a part of target vulnerability analysis, two other scientific disciplines provide indispensable inputs. These... [Pg.301]

Chapter 3 presents methods of describing targets for vulnerability analysis and again covers a wide spectrum of military targets. A number of computer programs for target description are discussed... [Pg.301]

Chapter 6, the last major element in target vulnerability analysis, synthesizes the parts into an integrated whole. Vulnerability methods for several types of targets are given as examples... [Pg.301]

Describe risk assessment, hazard identification, and vulnerability analysis. [Pg.2]


See other pages where Vulnerability analysis is mentioned: [Pg.268]    [Pg.273]    [Pg.274]    [Pg.500]    [Pg.129]    [Pg.300]    [Pg.300]    [Pg.300]    [Pg.300]    [Pg.301]    [Pg.301]    [Pg.268]    [Pg.273]    [Pg.274]    [Pg.500]    [Pg.500]    [Pg.3]    [Pg.8]    [Pg.11]    [Pg.11]    [Pg.11]   
See also in sourсe #XX -- [ Pg.273 , Pg.274 ]

See also in sourсe #XX -- [ Pg.273 , Pg.274 ]

See also in sourсe #XX -- [ Pg.60 , Pg.249 , Pg.250 ]

See also in sourсe #XX -- [ Pg.380 ]

See also in sourсe #XX -- [ Pg.35 , Pg.35 ]




SEARCH



Accidents vulnerability analysis

Common Mode Analysis vulnerabilities

Risk and vulnerability analysis

Security Vulnerability Analysis

Site vulnerability analysis

Vulnerability

Vulnerability analysis frequency

Vulnerability analysis overview

© 2024 chempedia.info