戴联双, 汤长江, 冯治中, 冯庆善, 张华兵, 项小强. 油气管道恐怖袭击风险评估方法与应用[J]. 油气储运, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009
引用本文: 戴联双, 汤长江, 冯治中, 冯庆善, 张华兵, 项小强. 油气管道恐怖袭击风险评估方法与应用[J]. 油气储运, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009
Dai Lianshuang, Tang Changjiang, Feng Zhizhong, . Risk assessment methodology and application for oil and gas pipelines' terrorist attack[J]. Oil & Gas Storage and Transportation, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009
Citation: Dai Lianshuang, Tang Changjiang, Feng Zhizhong, . Risk assessment methodology and application for oil and gas pipelines' terrorist attack[J]. Oil & Gas Storage and Transportation, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009

油气管道恐怖袭击风险评估方法与应用

Risk assessment methodology and application for oil and gas pipelines' terrorist attack

  • 摘要: 安全易损性评估方法专门用于识别和分析设施面临的安全危险、威胁和易损性,其分析结果是一个相对的易损性风险等级。基于阻止、检测、延迟、响应4种基本战略制定安全目标,进而建立合理、经济、可行的针对蓄意破坏和恐怖袭击活动的预防体系,做出合理的风险管理决策。安全易损性评估流程包括5个步骤:资产特征确定与评估、威胁评估、易损性分析、风险评估和措施分析,最终实现合理配置有限的防护资源,以最小投入获得最大安全保障的目标。建立了针对某管道实例关键功能和关键资产的相应情形,对安全事件类型、威胁分类、后果、现有措施及易损性进行了分析,提出了相应的建议措施。该方法在油气管道中的应用能很好地评估恐怖活动带来的风险,并建立适度的预防体系。

     

    Abstract: Security vulnerability assessment methodology is used to identify and analyze the threat and the vulnerability of facilities which operators concern. The result of the security vulnerability is a relative vulnerability risk level. Based on the basic strategy in prevention, inspection, mitigation, response, the security goals and a rational, economic and feasible prevention system specific to the vandalism and terrorist attack are established, and appropriate risk management decisions are made. Security vulnerability assessment process includes five steps: identification characteristics of assets and assessment, threat assessment, vulnerability analysis, risk assessment and measures analysis. The purpose of security vulnerability assessment is to allocate the limited resources rationally, and achieve maximum safety and security under the minimum investment. An instance about the key functions and key assets for some pipeline is given. The appropriate circumstances, the type of security incident, threat classification, consequences, existing measures and vulnerability are analyzed, and corresponding measures are suggested. The method is adopted to well evaluate the risks of terrorist activities for oil and gas pipelines and is helpful for establishing an appropriate prevention system.

     

/

返回文章
返回