Dai Lianshuang, Tang Changjiang, Feng Zhizhong, . Risk assessment methodology and application for oil and gas pipelines' terrorist attack[J]. Oil & Gas Storage and Transportation, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009
Citation: Dai Lianshuang, Tang Changjiang, Feng Zhizhong, . Risk assessment methodology and application for oil and gas pipelines' terrorist attack[J]. Oil & Gas Storage and Transportation, 2011, 30(5): 337-339. DOI: CNKI:13-1093/TE.20110510.2211.009

Risk assessment methodology and application for oil and gas pipelines' terrorist attack

  • Security vulnerability assessment methodology is used to identify and analyze the threat and the vulnerability of facilities which operators concern. The result of the security vulnerability is a relative vulnerability risk level. Based on the basic strategy in prevention, inspection, mitigation, response, the security goals and a rational, economic and feasible prevention system specific to the vandalism and terrorist attack are established, and appropriate risk management decisions are made. Security vulnerability assessment process includes five steps: identification characteristics of assets and assessment, threat assessment, vulnerability analysis, risk assessment and measures analysis. The purpose of security vulnerability assessment is to allocate the limited resources rationally, and achieve maximum safety and security under the minimum investment. An instance about the key functions and key assets for some pipeline is given. The appropriate circumstances, the type of security incident, threat classification, consequences, existing measures and vulnerability are analyzed, and corresponding measures are suggested. The method is adopted to well evaluate the risks of terrorist activities for oil and gas pipelines and is helpful for establishing an appropriate prevention system.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return