Building Vulnerability Assessments

advertisement
Building Vulnerability Assessments
Mr. Ian Nimmo, the founder and owner of
User Centered Design Services, Inc., is a
world-recognized expert on HMI and Abnormal Situation Management. Mr. Nimmo is a
founder and former Program Director of the
Abnormal Situation Management (ASM)
Consortium. His research led to the development of EEMUA 191, the most frequently used
alarm management guideline in the world.
Ian Nimmo
President
UCDS, Inc.
User Centered Design Services, Inc. is a consulting company focused on Operational Excellence. UCDS, Inc. personnel have extensive plant experience and have designed
well over 100 control room facilities. Our first-hand plant
experience enables us to design an overall work environment that optimizes operator and organizational performance.
Headlines such as these are becoming commonplace!
Threats are real, and we must act to prevent or mitigate
them. Today, we must protect ourselves from a host of
threats, including:








Unauthorized entry/trespass (forced and covert)
Insider threats
Explosive threats: Stationary and moving vehicledelivered, mail bombs, package bombs
Ballistic threats: Small arms, high-powered rifles, driveby shootings, etc.
Weapons of mass destruction (chemical, biological, and
radiological)
Disruptive threats (hoaxes, false reports, malicious attempts to disrupt operations)
Cyber and information security threats
Supervisory Control and Acquisition Data (SCADA) system threats (relevant as they relate to HVAC, mechanical/electrical systems control and other utility systems
that are required to operate many functions within building)
UCDS, Inc. has a proven track record in providing expert
services to evaluate current plant conditions from control
room layout changes, console design, complete redesign,
operator workload and staffing, HMI standards, and alarm
management practices. UCDS also provides expert evaluation of business practices such as Management of Change,
shift turnover, and organizational change.
Building Vulnerability Assessment
UCDS uses a proven methodology to analyze the probability of occurrence of a particular threat. An assessment team
uses this methodology to identify primary building vulnerabilities. The assessment focuses on the site perimeter,
building, core functions, infrastructure, drawings and plans.
Building Vulnerability
Building Access
Are you prepared to prevent or mitigate an attack on your
facility buildings - from external or internal sources?
UCDS, can help you by performing a Building Vulnerability
Assessment for your buildings.
Vehicle
Proximity of parking, pickup, dropoff, delivery
Pedestrian
tracking accessibility, door/window
access
Mail Delivery
building access, opening
procedures,
Pkg. identification
High
Med
Low
None
3
2
1
0
The Building Vulnerability Assessment can be performed
during the design process for any new building or for existing buildings. In the case of existing buildings, the mitigation options can be implemented as the building is refurbished.

Evaluates building characteristic that affect consequences
First (outer) layer consisting of natural or manmade
barriers usually at a property line.

Evaluates building characteristics related to threat
rating
Second (middle) layer extending from the perimeter
of the site to the exterior face of the building.

Third (inner) layer consists of the interior of the
building and separates unsecured from secured areas.
Specifically, the assessment:


UCDS applies an approach to security that utilizes the concept of layers of security. Layers of security consists of
multiple security measures that surround an area that
needs to be protected. The three main layers of defense
are:

Evaluates the vulnerability of the building

Determines a risk assessment rating

Provides mitigation options, such as security systems
Consequences
Vulnerability
Risk
Assessment
Mitigation
Options
Risk
Management
Threat
Layers of Security
Benefits of UCDS Inc. Building Vulnerability Assessment Services:
 Provides analytical, accurate, and useful information on threats to facility buildings.

Allows you to make a rational, informed decision regarding building design.

Produces a systematic and rational assessment of risks.

Decreases the vulnerability of a building to threats.
User Centered Design Services, Inc. provides a full complement of services including consulting, control
room design, implementation, and training services to dramatically improve the operations in production
facilities around the world.
OUR SERVICES INCLUDE:





Control Room Design
Alarm Management
Best Practices Gap Analysis
Human-Machine Interface (HMI)
Operator Staffing Studies




Work Team Design
Management of Organizational Change
Operator Training Development
Console Design
For more information, Please visit www.mycontrolroom.com,
Contact us at smaddox@mycontrolroom.com, or call
Main Office 623 551 9057  Sales 512 869 6439
Download