Reniers et al., 2015 - Google Patents
Security risk assessment and protection in the chemical and process industryReniers et al., 2015
View PDF- Document ID
- 8814227118104163401
- Author
- Reniers G
- Van Lerberghe P
- Van Gulijk C
- Publication year
- Publication venue
- Process safety progress
External Links
Snippet
This article describes a security risk assessment and protection methodology that was developed for use in the chemical and process industries in Belgium. The method employs a risk‐based approach according to design principles for object‐oriented protection, using so …
- 239000000126 substance 0 title abstract description 65
Classifications
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/18—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength
- G08B13/189—Actuation by interference with heat, light or radiation of shorter wavelength; Actuation by intruding sources of heat, light or radiation of shorter wavelength using passive radiation detection systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/22—Electrical actuation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual entry or exit registers
- G07C9/00007—Access-control involving the use of a pass
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B15/00—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives
- G08B15/02—Identifying, scaring or incapacitating burglars, thieves or intruders, e.g. by explosives with smoke, gas, or coloured or odorous powder or liquid
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B29/00—Checking or monitoring of signalling or alarm systems; Prevention or correction of operating errors, e.g. preventing unauthorised operation
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public service
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Reniers et al. | Security risk assessment and protection in the chemical and process industry | |
Fennelly | Handbook of loss prevention and crime prevention | |
US8103601B2 (en) | Complexity systems management method | |
Baker et al. | The complete guide to physical security | |
Reid | Facility manager's guide to security: protecting your assets | |
Landucci et al. | Physical security in the process industry: theory with applications | |
Tekinerdogan et al. | Integrated process model for systems product line engineering of physical protection systems | |
Lallupersad et al. | Criminality at Shopping Malls: A South African Perspective | |
Hollnagel | Barrier analysis and accident prevention | |
Tekinerdogan et al. | Feature-driven survey of physical protection systems | |
Madigan | First Responders Handbook: An Introduction | |
Brooks | Intrusion Detection Systems in Physical Security | |
Johnson et al. | Security has gone to pot: an analysis of marijuana cultivation security laws and regulations in the United States | |
Purpura | Internal Threats and Countermeasures | |
Kingsley-Hefty | Physical Security Strategy and Process Playbook | |
Thoka | An evaluation of security threats and vulnerabilities to a national key point: case study of Medupi Power Station | |
Wayland | Emergency Preparedness for Business Professionals: How to Mitigate and Respond to Attacks Against Your Organization | |
Dunbobbin et al. | Security vulnerability assessment in the chemical industry | |
Salih et al. | Enhancement of Physical Security Control for Data Centre and Perimeter in Banking: A Case Study of Central Bank of Sudan (CBOS) | |
Vellani | Vulnerability assessments | |
Philpott et al. | The Integrated Physical Security Handbook | |
Lallupersad | An Assessment of Security Measures at Shopping Malls: Case Study from Durban, KwaZulu-Natal, South Africa | |
Vellani | Threat Assessments | |
Zeegers | Security of Infrastructure | |
Rabkin et al. | Transit security design considerations |