PC-OCT23-PG22-23.1_Layout 1 03/10/2023 10:09 Page 23
HAZARDOUS AREAS & SAFETY
• Better understanding the unique threats
they face - When conducting a threat assessment, facilities can start by identifying adversaries, their intent and capability, then review tactics from past attacks at similar locations to estimate the threat to the organisation. • Assessing
vulnerability - Understanding the threat is essential, but the ability to deter attack is amplified by understanding vulnerability. Vulnerability can be considered as the psychological, sociological, or physical characteristics that leave an asset unprotected or exploitable for attack. Typically, the emphasis is on physical security vulnerabilities, but the human factor can make or break security efforts. Thinking “It will never happen here” or “It will never happen to me” can add to vulnerability. • Quantifying risk – Risk is defined in the
basic form as “R = L x C”, where R is risk, L is the likelihood of the event occurring, and C is its consequence. When it comes to performing risk calculations, most organisations focus heavily on the consequence term of the equation without measuring it against its associated likelihood. This makes it difficult to accurately prioritise risks and efficiently allocate resources toward mitigation measures. It also shifts the focus away from identifying critical vulnerabilities in infrastructure and leaves operations unprotected
from “low probability” events. To develop a complete risk
profile, both the consequence and
likelihood terms of the risk equation should be thoroughly evaluated. After quantifying the risk, enterprises can
begin to take preventative action by physically hardening infrastructure, such as utilising perimeter protection, blast analysis and design, facade strengthening,
disproportionate collapse mitigation, local hardening of security command centres, and more. Another important step is security systems evaluation and design (i.e., intrusion detection, monitoring and surveillance, access control systems, security policies and procedures, redundancy evaluations, etc.), along with the implementation of dependency mitigation measures related to emergency backup power, spare parts, supply chains, emergency response, and so on. Adversaries continually seek the weakest
link in their target’s security. Therefore, a balanced and well-thought-out security profile that includes cybersecurity and physical security can be vital for effective facility protection and safety. In both the physical and cyber worlds,
security should not be viewed as a cost but as an investment to improve the overall safety of the facility. Organisations must remember that one of the primary goals of any security measure is to preserve the safe, reliable operation of physical infrastructure.
ABS Group
www.abs-group.com
LHS 210 / 410
NEW AIR HEATER SERIES COMPACT & POWERFUL
$
EASY CONNECTION HOT AIR RECYCLING ECONOMICAL
COMPATIBLE NOZZLES HIGH AIR VOLUME OVERHEATING PROTECTION
Tel: +44 (0)1707 331111
info@welwyntoolgroup.co.uk |
www.welwyntoolgroup.com
OCTOBER 2023 | PROCESS & CONTROL 23
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50