globalchange  > 过去全球变化的重建
DOI: 10.2172/1030214
报告号: LLNL-TR-470575
报告题名:
Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure
作者: Gutzeit, Jennifer L.; Kennedy, Ellen P.; Bjornstad, Bruce N.; Sackschewsky, Michael R.; Sharpe, James J.; DeMaris, Ranae; Venno, M.; Christensen, James R.
出版年: 2011
发表日期: 2011-02-04
总页数: 7
国家: 美国
语种: 英语
中文主题词: 基础设施 ; 天然气 ; 频散
主题词: INFRASTRUCTURE ; NATURAL GAS ; DISPERSION
英文摘要: Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NARAC/IMAAC has capabilities to respond to toxic industrial chemical spills, nuclear-power plant accidents, fires, chemical/biological agents, radiological/nuclear devices (RDDs, INDs), and other airborne hazards. Our web-based systems provide hazards assessments of critical infrastructure for defensive planning and can provide infrastructure operators and emergency responders with a baseline for planning and exercises. LLNL's infrastructure security web mapping services facilitate dissemination of technical information for all phases of disaster management. Examples of some of these products are shown in the Figure 1.
URL: http://www.osti.gov/scitech/servlets/purl/1030214
Citation statistics:
资源类型: 研究报告
标识符: http://119.78.100.158/handle/2HF3EXSE/40320
Appears in Collections:过去全球变化的重建
影响、适应和脆弱性
科学计划与规划
气候变化与战略
全球变化的国际研究计划
气候减缓与适应
气候变化事实与影响

Files in This Item: Download All
File Name/ File Size Content Type Version Access License
1030214.pdf(152KB)研究报告--开放获取View Download

Recommended Citation:
Gutzeit, Jennifer L.,Kennedy, Ellen P.,Bjornstad, Bruce N.,et al. Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure. 2011-01-01.
Service
Recommend this item
Sava as my favorate item
Show this item's statistics
Export Endnote File
Google Scholar
Similar articles in Google Scholar
[Gutzeit, Jennifer L.]'s Articles
[Kennedy, Ellen P.]'s Articles
[Bjornstad, Bruce N.]'s Articles
百度学术
Similar articles in Baidu Scholar
[Gutzeit, Jennifer L.]'s Articles
[Kennedy, Ellen P.]'s Articles
[Bjornstad, Bruce N.]'s Articles
CSDL cross search
Similar articles in CSDL Cross Search
[Gutzeit, Jennifer L.]‘s Articles
[Kennedy, Ellen P.]‘s Articles
[Bjornstad, Bruce N.]‘s Articles
Related Copyright Policies
Null
收藏/分享
文件名: 1030214.pdf
格式: Adobe PDF
此文件暂不支持浏览
所有评论 (0)
暂无评论
 

Items in IR are protected by copyright, with all rights reserved, unless otherwise indicated.