IDEAS home Printed from https://ideas.repec.org/a/eee/ijocip/v7y2014i3p167-177.html
   My bibliography  Save this article

A computational asset vulnerability model for the strategic protection of the critical infrastructure

Author

Listed:
  • White, Richard
  • Boult, Terrance
  • Chow, Edward

Abstract

A 2010 study by the National Research Council determined that the U.S. Department of Homeland Security (DHS) lacks adequate risk measures to guide strategic investment decisions for protecting the critical infrastructure. Current threat-driven approaches are hampered by a dearth of historical data that could support robust statistical analysis. This paper presents an asset vulnerability model (AVM) that is designed to address the problem and to provide a strategic risk measure. The AVM risk formulation is predicated on Θ, the probability of failure of an attacker, based on earlier work in game theory. Working within the DHS Risk Management Framework, AVM supports baseline analysis, cost–benefit analysis and the development of decision support tools that convey current risk levels, evaluate alternative protection measures, demonstrate risk reduction across multiple assets, and measure and track improvements over time. Moreover, AVM supports a computational approach for evaluating alternative risk reduction strategies. Seven strategies are examined using AVM: least cost, least protected, region protection, sector protection, highest protective gain, highest consequence and random protection. Experimental results indicate that the highest consequence investment strategy achieves the best protection over time. This paper also summarizes AVM research and demonstrates how it can help guide the strategic protection of the critical infrastructure.

Suggested Citation

  • White, Richard & Boult, Terrance & Chow, Edward, 2014. "A computational asset vulnerability model for the strategic protection of the critical infrastructure," International Journal of Critical Infrastructure Protection, Elsevier, vol. 7(3), pages 167-177.
  • Handle: RePEc:eee:ijocip:v:7:y:2014:i:3:p:167-177
    DOI: 10.1016/j.ijcip.2014.06.002
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S1874548214000419
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ijcip.2014.06.002?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Barry Charles Ezell & Steven P. Bennett & Detlof Von Winterfeldt & John Sokolowski & Andrew J. Collins, 2010. "Probabilistic Risk Analysis and Terrorism Risk," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 575-589, April.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Wu, Yipeng & Chen, Zhilong & Zhao, Xudong & Liu, Ying & Zhang, Ping & Liu, Yajiao, 2021. "Robust analysis of cascading failures in complex networks," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 583(C).
    2. Han, Lin & Zhao, Xudong & Chen, Zhilong & Wu, Yipeng & Su, Xiaochao & Zhang, Ning, 2021. "Optimal allocation of defensive resources to defend urban power networks against different types of attackers," International Journal of Critical Infrastructure Protection, Elsevier, vol. 35(C).

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Yanling Chang & Alan Erera & Chelsea White, 2015. "Value of information for a leader–follower partially observed Markov game," Annals of Operations Research, Springer, vol. 235(1), pages 129-153, December.
    2. Li, Yapeng & Qiao, Shun & Deng, Ye & Wu, Jun, 2019. "Stackelberg game in critical infrastructures from a network science perspective," Physica A: Statistical Mechanics and its Applications, Elsevier, vol. 521(C), pages 705-714.
    3. Robin L. Dillon & William J. Burns & Richard S. John, 2018. "Insights for Critical Alarm-Based Warning Systems from a Risk Analysis of Commercial Aviation Passenger Screening," Decision Analysis, INFORMS, vol. 15(3), pages 154-173, September.
    4. Michael R. Greenberg & Karen Lowrie & Henry Mayer & Tayfur Altiok, 2011. "Risk‐Based Decision Support Tools: Protecting Rail‐Centered Transit Corridors from Cascading Effects," Risk Analysis, John Wiley & Sons, vol. 31(12), pages 1849-1858, December.
    5. John Hamer Powell & Michael Hammond & Albert Chen & Navonil Mustafee, 2018. "Human Agency in Disaster Planning: A Systems Approach," Risk Analysis, John Wiley & Sons, vol. 38(7), pages 1422-1443, July.
    6. Jason Merrick & Gregory S. Parnell, 2011. "A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management," Risk Analysis, John Wiley & Sons, vol. 31(9), pages 1488-1510, September.
    7. Mark G. Stewart & John Mueller, 2013. "Terrorism Risks and Cost‐Benefit Analysis of Aviation Security," Risk Analysis, John Wiley & Sons, vol. 33(5), pages 893-908, May.
    8. Zhongbei Li & Xiangchun Li & Chen Dong & Fanfan Guo & Fan Zhang & Qi Zhang, 2021. "Quantitative Analysis of Global Terrorist Attacks Based on the Global Terrorism Database," Sustainability, MDPI, vol. 13(14), pages 1-19, July.
    9. Chaoqi, Fu & Yangjun, Gao & Jilong, Zhong & Yun, Sun & Pengtao, Zhang & Tao, Wu, 2021. "Attack-defense game for critical infrastructure considering the cascade effect," Reliability Engineering and System Safety, Elsevier, vol. 216(C).
    10. Barry Ezell & Andrew Collins, 2011. "Letter to the Editor," Risk Analysis, John Wiley & Sons, vol. 31(2), pages 192-192, February.
    11. Christoph Werner & Tim Bedford & John Quigley, 2018. "Sequential Refined Partitioning for Probabilistic Dependence Assessment," Risk Analysis, John Wiley & Sons, vol. 38(12), pages 2683-2702, December.
    12. G. Quijano, Eduardo & Ríos Insua, David & Cano, Javier, 2018. "Critical networked infrastructure protection from adversaries," Reliability Engineering and System Safety, Elsevier, vol. 179(C), pages 27-36.
    13. Edouard Kujawski, 2016. "A Probabilistic Game‐Theoretic Method to Assess Deterrence and Defense Benefits of Security Systems," Systems Engineering, John Wiley & Sons, vol. 19(6), pages 549-566, November.
    14. Laobing Zhang & Genserik Reniers, 2016. "A Game‐Theoretical Model to Improve Process Plant Protection from Terrorist Attacks," Risk Analysis, John Wiley & Sons, vol. 36(12), pages 2285-2297, December.
    15. Rongchen Zhu & Xiaofeng Hu & Xin Li & Han Ye & Nan Jia, 2020. "Modeling and Risk Analysis of Chemical Terrorist Attacks: A Bayesian Network Method," IJERPH, MDPI, vol. 17(6), pages 1-23, March.
    16. L. Elbakidze & Y. H. Jin, 2015. "Are Economic Development and Education Improvement Associated with Participation in Transnational Terrorism?," Risk Analysis, John Wiley & Sons, vol. 35(8), pages 1520-1535, August.
    17. Chaoqi, Fu & Pengtao, Zhang & Lin, Zhou & Yangjun, Gao & Na, Du, 2021. "Camouflage strategy of a Stackelberg game based on evolution rules," Chaos, Solitons & Fractals, Elsevier, vol. 153(P2).
    18. Jonathan B. Wiener, 2020. "Learning to Manage the Multirisk World," Risk Analysis, John Wiley & Sons, vol. 40(S1), pages 2137-2143, November.
    19. Jason R. W. Merrick & Philip Leclerc, 2016. "Modeling Adversaries in Counterterrorism Decisions Using Prospect Theory," Risk Analysis, John Wiley & Sons, vol. 36(4), pages 681-693, April.
    20. Christopher W. Karvetski & David R. Mandel & Daniel Irwin, 2020. "Improving Probability Judgment in Intelligence Analysis: From Structured Analysis to Statistical Aggregation," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1040-1057, May.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ijocip:v:7:y:2014:i:3:p:167-177. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: https://www.journals.elsevier.com/international-journal-of-critical-infrastructure-protection .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.