A Methodology for the Identification of Critical Locations in Infrastructures

The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from...

Full description

Bibliographic Details
Main Author: Lemon, Douglas M.
Format: Working Paper
Language:en_US
Published: Massachusetts Institute of Technology. Engineering Systems Division 2016
Online Access:http://hdl.handle.net/1721.1/102756
_version_ 1826190008824889344
author Lemon, Douglas M.
author_facet Lemon, Douglas M.
author_sort Lemon, Douglas M.
collection MIT
description The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology.
first_indexed 2024-09-23T08:33:37Z
format Working Paper
id mit-1721.1/102756
institution Massachusetts Institute of Technology
language en_US
last_indexed 2024-09-23T08:33:37Z
publishDate 2016
publisher Massachusetts Institute of Technology. Engineering Systems Division
record_format dspace
spelling mit-1721.1/1027562019-04-09T18:29:35Z A Methodology for the Identification of Critical Locations in Infrastructures Lemon, Douglas M. The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology. 2016-06-01T14:53:11Z 2016-06-01T14:53:11Z 2004-06 Working Paper http://hdl.handle.net/1721.1/102756 en_US ESD Working Papers;ESD-WP-2004-01 application/pdf Massachusetts Institute of Technology. Engineering Systems Division
spellingShingle Lemon, Douglas M.
A Methodology for the Identification of Critical Locations in Infrastructures
title A Methodology for the Identification of Critical Locations in Infrastructures
title_full A Methodology for the Identification of Critical Locations in Infrastructures
title_fullStr A Methodology for the Identification of Critical Locations in Infrastructures
title_full_unstemmed A Methodology for the Identification of Critical Locations in Infrastructures
title_short A Methodology for the Identification of Critical Locations in Infrastructures
title_sort methodology for the identification of critical locations in infrastructures
url http://hdl.handle.net/1721.1/102756
work_keys_str_mv AT lemondouglasm amethodologyfortheidentificationofcriticallocationsininfrastructures
AT lemondouglasm methodologyfortheidentificationofcriticallocationsininfrastructures