Abstract

Adaptation to security vulnerability analysis (SVA) evaluates risk from deliberate acts that could result in major incidents. It is performed in a systematic and methodical manner by a multi-disciplined team coached by a leader. SVA analyses potential threats and evaluates these threats against plant vulnerabilities. From this analysis, it determines possible consequences and safeguards to prevent or mitigate their occurrence are recommended. This procedure and documentation is similar in manner to existing preliminary hazard analysis (PHA) methodologies, so it can be easily adapted into existing programs efficiently and effectively. Sections in this book that describe PHA procedures have been expanded to also include SVA steps. Some consulting companies that offer PHAs have added SVAs to their capabilities due to the similar nature and overlapping objectives. They have easily adapted PHA software into SVAs in order to conduct the reviews. Although SVAs are similar to PHAs, there are some notable differences such as PHA typically evaluates equipment and operator failures, while SVAs evaluate scenarios that originate from deliberate actions.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call