[go: up one dir, main page]

Reniers et al., 2015 - Google Patents

Security risk assessment and protection in the chemical and process industry

Reniers et al., 2015

View PDF
Document ID
8814227118104163401
Author
Reniers G
Van Lerberghe P
Van Gulijk C
Publication year
Publication venue
Process safety progress

External Links

Snippet

This article describes a security risk assessment and protection methodology that was developed for use in the chemical and process industries in Belgium. The method employs a risk‐based approach according to design principles for object‐oriented protection, using so …
Continue reading at eprints.hud.ac.uk (PDF) (other versions)

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual entry or exit registers
    • G07C9/00007Access-control involving the use of a pass
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B15/00Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
    • G08B15/02Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B29/00Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public service
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud

Similar Documents

Publication Publication Date Title
Reniers et al. Security risk assessment and protection in the chemical and process industry
Fennelly Handbook of loss prevention and crime prevention
US8103601B2 (en) Complexity systems management method
Baker et al. The complete guide to physical security
Reid Facility manager's guide to security: protecting your assets
Landucci et al. Physical security in the process industry: theory with applications
Tekinerdogan et al. Integrated process model for systems product line engineering of physical protection systems
Lallupersad et al. Criminality at Shopping Malls: A South African Perspective
Hollnagel Barrier analysis and accident prevention
Tekinerdogan et al. Feature-driven survey of physical protection systems
Madigan First Responders Handbook: An Introduction
Brooks Intrusion Detection Systems in Physical Security
Johnson et al. Security has gone to pot: an analysis of marijuana cultivation security laws and regulations in the United States
Purpura Internal Threats and Countermeasures
Kingsley-Hefty Physical Security Strategy and Process Playbook
Thoka An evaluation of security threats and vulnerabilities to a national key point: case study of Medupi Power Station
Wayland Emergency Preparedness for Business Professionals: How to Mitigate and Respond to Attacks Against Your Organization
Dunbobbin et al. Security vulnerability assessment in the chemical industry
Salih et al. Enhancement of Physical Security Control for Data Centre and Perimeter in Banking: A Case Study of Central Bank of Sudan (CBOS)
Vellani Vulnerability assessments
Philpott et al. The Integrated Physical Security Handbook
Lallupersad An Assessment of Security Measures at Shopping Malls: Case Study from Durban, KwaZulu-Natal, South Africa
Vellani Threat Assessments
Zeegers Security of Infrastructure
Rabkin et al. Transit security design considerations