A Methodology for the Identification of Critical Locations in Infrastructures
The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from...
Main Author: | |
---|---|
Format: | Working Paper |
Language: | en_US |
Published: |
Massachusetts Institute of Technology. Engineering Systems Division
2016
|
Online Access: | http://hdl.handle.net/1721.1/102756 |
_version_ | 1826190008824889344 |
---|---|
author | Lemon, Douglas M. |
author_facet | Lemon, Douglas M. |
author_sort | Lemon, Douglas M. |
collection | MIT |
description | The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology. |
first_indexed | 2024-09-23T08:33:37Z |
format | Working Paper |
id | mit-1721.1/102756 |
institution | Massachusetts Institute of Technology |
language | en_US |
last_indexed | 2024-09-23T08:33:37Z |
publishDate | 2016 |
publisher | Massachusetts Institute of Technology. Engineering Systems Division |
record_format | dspace |
spelling | mit-1721.1/1027562019-04-09T18:29:35Z A Methodology for the Identification of Critical Locations in Infrastructures Lemon, Douglas M. The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology. 2016-06-01T14:53:11Z 2016-06-01T14:53:11Z 2004-06 Working Paper http://hdl.handle.net/1721.1/102756 en_US ESD Working Papers;ESD-WP-2004-01 application/pdf Massachusetts Institute of Technology. Engineering Systems Division |
spellingShingle | Lemon, Douglas M. A Methodology for the Identification of Critical Locations in Infrastructures |
title | A Methodology for the Identification of Critical Locations in Infrastructures |
title_full | A Methodology for the Identification of Critical Locations in Infrastructures |
title_fullStr | A Methodology for the Identification of Critical Locations in Infrastructures |
title_full_unstemmed | A Methodology for the Identification of Critical Locations in Infrastructures |
title_short | A Methodology for the Identification of Critical Locations in Infrastructures |
title_sort | methodology for the identification of critical locations in infrastructures |
url | http://hdl.handle.net/1721.1/102756 |
work_keys_str_mv | AT lemondouglasm amethodologyfortheidentificationofcriticallocationsininfrastructures AT lemondouglasm methodologyfortheidentificationofcriticallocationsininfrastructures |