A methodology for the identification of critical locations in infrastructures

Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiqu...

Full description

Bibliographic Details
Main Author: Lemon, Douglas M. (Douglas Michael), 1967-
Other Authors: George E. Apostolakis.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2005
Subjects:
Online Access:http://hdl.handle.net/1721.1/17749
Description
Summary:Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology. === by Douglas M. Lemon. === S.M.