Abstract
AbstractProcess plants may be subject to terrorist and criminal acts that can cause harm such as the release or diversion of hazardous materials and process or product damage. Such risks are evaluated using threat and vulnerability analysis and possible improvements in security measures and safeguards are identified. However, recommendations for improvements are usually based on engineering judgment. Such subjective assessments can lead to disagreements, and possibly inappropriate measures to reduce risk. Rings of Protection Analysis (ROPA), a simplified risk assessment method, can be used to provide more rational, objective, and reproducible decisions. ROPA parallels Layers of Protection Analysis (LOPA) that is used to evaluate accident risks.ROPA assists in identifying and determining the adequacy of existing protection systems. It is used to help determine whether there are sufficient rings/layers of protection against a threat scenario and whether the risk can be tolerated. A scenario may require multiple protection rings/layers depending on the process and the potential severity of the consequences. ROPA helps provide the basis for clear, functional specifications of required protection layers.This paper describes and demonstrates how ROPA can be applied to cyber security, although it can also be applied to physical security. It considers the selection of security measures and integrates their consideration with other types of protective measures. © 2004 American Institute of Chemical Engineers Process Saf Prog, 2004
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.