A methodology for the identification of critical locations in infrastructures

Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiqu...

Full description

Bibliographic Details
Main Author: Lemon, Douglas M. (Douglas Michael), 1967-
Other Authors: George E. Apostolakis.
Format: Others
Language:English
Published: Massachusetts Institute of Technology 2005
Subjects:
Online Access:http://hdl.handle.net/1721.1/17749
id ndltd-MIT-oai-dspace.mit.edu-1721.1-17749
record_format oai_dc
spelling ndltd-MIT-oai-dspace.mit.edu-1721.1-177492019-05-02T15:51:17Z A methodology for the identification of critical locations in infrastructures Lemon, Douglas M. (Douglas Michael), 1967- George E. Apostolakis. Massachusetts Institute of Technology. Dept. of Nuclear Engineering. Massachusetts Institute of Technology. Dept. of Nuclear Engineering. Nuclear Engineering. Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. Includes bibliographical references (leaves 72-76). The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology. by Douglas M. Lemon. S.M. 2005-06-02T18:29:55Z 2005-06-02T18:29:55Z 2004 2004 Thesis http://hdl.handle.net/1721.1/17749 56504116 eng M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. http://dspace.mit.edu/handle/1721.1/7582 113 leaves 4237228 bytes 4237035 bytes application/pdf application/pdf application/pdf Massachusetts Institute of Technology
collection NDLTD
language English
format Others
sources NDLTD
topic Nuclear Engineering.
spellingShingle Nuclear Engineering.
Lemon, Douglas M. (Douglas Michael), 1967-
A methodology for the identification of critical locations in infrastructures
description Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Nuclear Engineering, 2004. === Includes bibliographical references (leaves 72-76). === The extreme importance of critical infrastructures to modem society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This project examines a screening methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory, and involves various disciplines including quantitative risk assessment and decision analysis. The methodology is illustrated through the presentation of a portion on the analysis conducted on the community of the Massachusetts Institute of Technology. === by Douglas M. Lemon. === S.M.
author2 George E. Apostolakis.
author_facet George E. Apostolakis.
Lemon, Douglas M. (Douglas Michael), 1967-
author Lemon, Douglas M. (Douglas Michael), 1967-
author_sort Lemon, Douglas M. (Douglas Michael), 1967-
title A methodology for the identification of critical locations in infrastructures
title_short A methodology for the identification of critical locations in infrastructures
title_full A methodology for the identification of critical locations in infrastructures
title_fullStr A methodology for the identification of critical locations in infrastructures
title_full_unstemmed A methodology for the identification of critical locations in infrastructures
title_sort methodology for the identification of critical locations in infrastructures
publisher Massachusetts Institute of Technology
publishDate 2005
url http://hdl.handle.net/1721.1/17749
work_keys_str_mv AT lemondouglasmdouglasmichael1967 amethodologyfortheidentificationofcriticallocationsininfrastructures
AT lemondouglasmdouglasmichael1967 methodologyfortheidentificationofcriticallocationsininfrastructures
_version_ 1719029352675409920