2001-05 - Department of Systems and Information Engineering

advertisement
2001 Systems Engineering Capstone Conference • University of Virginia
VIRGINIA’S CRITICAL INFRASTRUCURE PROTECTION:
A RISK ASSESSMENT AND MANAGEMENT STUDY
Student team: Scott Crenshaw, Krista Moses, Zach Slagel, Jason Wynegar
Capstone Faculty Advisor: Yacov Y. Haimes
E-mail: haimes@virginia.edu
Project Team: (Faculty) Stephanie Guerlain, Stan Kaplan, Jim Lambert, and (Research Assistant) Felicia Leung
Department of Systems Engineering
Client Advisors: Wayne Ferguson and John Miller
Virginia Transportation Research Council
Charlottesville, VA
E-mail: vtrcweb@vdot.state.va.us
KEYWORDS: Critical Transportation Infrastructure,
Risk Analysis, Risk Assessment, Risk Management,
Terrorism.
ABSTRACT
A comprehensive, methodological framework is
developed for the assessment and management of risks
to critical transportation infrastructures in the state of
Virginia. Five case studies are presented that focus on
performing quantitative risk analysis and developing
risk management options to increase safety and
functionality. Evolving from this project is a set of
management policies (structural and non-structural) and
decision-making tools that facilitate effective trade-off
analysis in terms of cost, risk-reduction, damage and
operability. From this analysis, decision makers will be
able to identify deficiencies in the system’s robustness,
resiliency, redundancy and security, and decide on what
measures to implement based on the trade-offs
associated with each option. Because of the universality
of the framework developed, this project will lay the
foundation for future risk assessment and management
plans for other critical infrastructures. This project
serves as a pilot study for increasing the safety and
security of transportation infrastructures in the state of
Virginia.
INTRODUCTION
nation’s defense or economic security): banking and
finance, continuity of government, electrical power
systems, emergency services, gas and oil
storage/transportation, telecommunication,
transportation, and water supply systems. The following
quotations are from Executive Order 13010, illustrating
the importance of these infrastructures.
America’s critical infrastructures underpin every
aspect of our lives. They are the foundations of our
prosperity, enablers of our defense, and the vanguard
of our future. They empower every element of our
society. There is no more urgent priority than assuring
the security, continuity, and availability of our critical
infrastructures. Our national defense, economic
prosperity, and quality of life have long depended on
the essential services that underpin our
society.(Clinton, 1996)
Needs
Transportation systems are extremely vulnerable to
planned and unplanned attacks because of their
“openness,” and are difficult to protect against terrorism
and natural threats. Therefore, a methodological
framework for identifying, prioritizing, filtering,
ranking, and managing risks is described. Furthermore,
an application of these tools is shown for five
transportation structures in order to determine what
risks are associated with a particular system and what
can be done to minimize these threats.
Background
Scope
On July 15, 1996 President Clinton issued
Executive Order 13010 which defined the following
eight infrastructures as critical (critical meaning their
loss would have a significant negative effect on the
The transportation infrastructure in Virginia is one
of the most vital systems on the Mid-Atlantic Coast of
the U.S. It contains major east / west connectors for
177
Virginia’s Critical Infrastructure Protection
travelers in the Mid-Atlantic region, the world’s largest
Naval base, the Port of Virginia, and the second most
complex system of underwater tunnels and bridges in
the world. In order to keep this system running, it must
have the utmost protection against threat to its critical
infrastructure. On top of the numerous physical
structures that move traffic in Virginia, there are
command, control, and communication centers that
monitor the traffic flows as well. With the complex
interconnectedness among critical assets in Virginia, it
is imperative that proper risk management practices be
applied to ensure the safety of the transportation
system. The interconnectedness among cyber control
systems, the threat of terrorist attack, and other extreme
events are the focus of the study.
METHODOLOGICAL APPROACH
Risk Assessment
Risk assessment is the first phase in analyzing a
system and determining what can go wrong and with
what likelihood. The risk assessment stage attempts to
answer three main questions: 1) What are the risks?, 2)
What are the likelihoods of the risks occurring?, and 3)
What are the associated consequences? (Garrick and
Kaplan, 1981). The first of the questions identifies the
risks. What are the scenarios that, if occurring, would
jeopardize the lives of the users and operators of the
system or damage the system’s functionality? There
are two possible perspectives in identifying risk
scenarios: (1) What can make the system fail? and (2)
What can be done to make the system fail? The latter
implies an intentional act, therefore, pertains to
terrorism scenarios; whereas the first perspective
involves natural hazards, accidental failures, and
maintenance issues.
Once the risks have been identified, the next
question is: What are the likelihoods of these risks
occurring? Given the risk scenario, what is the
probability that it will happen? The first step is to
determine the likelihoods using qualitative
measurements such as very likely, likely, not very
likely, seldom, etc. This step will allow us to complete
additional filtering of risks if we decide that the given
risk is not very severe and not very likely, and;
therefore, can be dropped from future analysis. The
second step is to actually measure quantitative
probabilities and use these in place of the qualitative
measurements for likelihood. These numbers will be
obtained through structured research as well as through
expert evidence from people who have detailed
understanding of the system. This knowledge will
allow us to refine our listing of the major risk scenarios
even further.
178
The last question is: What are the associated
consequences? What will happen to the structure,
surrounding area, government and military mobility,
and economic stability, among others, if these risks take
place? In other words, what will the impact be of the
resulting risks on the community and society as a
whole? Consequences may be categorized according to
public safety and health, functional impact, economic
impact, and environmental impact among others. After
this question is answered, we will iterate through this
entire process to determine what, if any, risk scenario
has been overlooked.
Risk Management
Following completion of the risk filtering,
assessment, and ranking procedures comes risk
management. Within the risk management framework,
three main questions are addressed: 1) What can be
done to minimize the given risks defined in the risk
assessment?, 2) What are the associated trade-offs of
implementing these risk management options?, and 3)
What will be the future impacts of management options
made in the present time? (Haimes, 1991, 1998).
Firstly, we seek to find what options can we
recommend that will increase the safety of people
involved, as well as the overall functionality of the
asset? We will be looking at factors such as structure
redundancy, resiliency, recovery, and security. These
classes of factors are defined as (Haimes, Kaplan,
Lambert, 2001):
 Redundancy is a measure that, if a component of an
asset fails, assesses how many other components
can take over for the failed component until the
component is repaired.
 Resiliency is a measure that, if a part of a structure
fails, calculates how capable the structure is in terms
of maintaining at least partial functionality.
 Recovery is pretty straightforward; it measures how
long it takes for the structure to regain total
functionality after an adverse event has occurred,
and how easy that process is. By optimizing these
characteristics, overall structure safety and security
will increase.
The next question to be answered is corollary to the
previous one: What are the associated trade-offs of
implementing these risk management options? Some of
the main factors that will determine what procedures
should be recommended are the following: cost,
benefit, ability to increase user safety, ability to
increase redundancy, resiliency, and recovery, other
risks imposed by implementation of a new procedure,
how long it will take to become functional, and many
others. Once these items are taken into consideration,
management options are recommended for
2001 Systems Engineering Capstone Conference • University of Virginia
implementation. Methodologies such as fault trees,
decision trees, and multi-objective trade-off analysis are
used.
The final question to be addressed in this stage is:
What will be the future impacts of management options
made in the present time? Namely, upon
implementation of a plan today, what are the possible
pros and cons that could result in the future? Would the
risk of overall system failure become smaller if a
procedure is assigned that would make the structure or
facility more resilient to attack? Would the benefits of
implanting such a procedure be worth more than the
cost? These are questions that will be attempted to
answer in this part of the risk management framework.
Site Selection
Case study sites in Virginia were chosen for
validation of the framework. The original intent was to
focus on bridges and tunnels, however, based on
consultation with advisors and clients, the case studies
were selected to include different types of assets. By
sampling various assets the framework could be tested
in a more effective manner. The following are the types
of sites selected:
 A command, control, and communications
center
 A critical bridge
 Two critical bridge/tunnels
 An intersection of two major highways
 An intersection of a major highway and a vital,
urban road
Risk Filtering, Ranking, and Management
Risk Filtering, Ranking, and Management, otherwise
known as RFRM, is a methodology developed by
Yacov Y. Haimes, Stan Kaplan, and James H. Lambert
in order to identify, prioritize, assess, and manage
multiple risk scenarios from different angles within a
large-scale system. RFRM is comprised of an eightphase process that uses qualitative and quantitative
assessments to achieve a listing of the most important
risks of a system. Phases I and II are interested in
realizing and narrowing down the areas of risk in terms
of the assessment. Phases III through V are concerned
with the filtering and ranking of risks specific to the
analysis. Phases VI creates risk management options,
and phases VII and VIII check the methodology and get
feedback, respectively.
Phase I: Scenario Identification. This phase is
accomplished through the construction of a Hierarchical
Holographic Model (HHM) (Haimes, 1991, 1998). The
HHM can be described as a diagram that categorizes
multiple perspectives of a system that encapsulates the
gestalt of the sources of risk to the system. An HHM
describes a series of ‘as planned scenarios’ that are
represented by head nodes and sub-nodes for each
perspective. Through the HHM, one can look at every
source and point of risk within and outside the system.
Phase II: Filtering on Scope, Decision Makers, and
Time Domains. This phase entails a process in which
the entire set of risks are narrowed down into levels that
the decision maker is more concerned with. Upon
completion of this phase the analyst will have identified
a more relevant subset of risk categories pertinent to the
decision maker’s domain and interest.
Phase III: Ordinal Filtering and Ranking. It is a
process in which the set of categories developed in
phase II can be reduced down even further. In this step,
a risk matrix, that describes likelihood and consequence
levels for sources of risk, is used. The matrix, similar
to Figure 1, combines consequence and likelihood in
order to create a relative ‘severity’ measure for each
risk source. The risk scenarios that the assessment is
concerned with are the ones with the highest severity;
therefore, we set aside the risks that fall into low
categories of severity. However, we will not disregard
low severity risks because they might be of interest
later in the RFRM process. Upon completion of this
phase approximately 50 risks should be left.
Likelihood
Most
Likely Effect
Unlikely
Seldom
Occasional
Likely
Frequent
Loss of life due to
system failure
Loss of entire
system
functionality
Security breach
Partial system
failure
Component failure
Extremely
High Risk
High Risk
Moderate
Risk
Low Risk
Figure 1. Risk matrix with natural language for Phase
III (After US Air Force [1988]).
Phase IV: Multi-Attribute Evaluation Phase. This
phase requires the use of eleven attributes, grouped into
three categories, in order to assess the defensive
capabilities of the system. Defensive capabilities are
defined in terms of resilience, robustness and
redundancy along with security. Each of the attributes
of defense ability are measured in terms of high,
medium, or low levels of significance. By evaluating
each risk the analyst can compare in more detail the
impacts these risks have on the system. This aids the
filtering in phase V.
179
Virginia’s Critical Infrastructure Protection
the system. These policies range from structural
improvements like reinforcing girders on an
interchange to non-structural measures such as
implementing security measures that restrict access to
the structures.
CONCLUSIONS
This Capstone Project has demonstrated that: 1)
There are hundreds of risks facing every transportation
infrastructure, 2) The aforementioned methods can
identify these risks, and then filter them down to a
manageable number, and 3) The risk management
techniques can provide invaluable information to policy
makers pertaining to the costs and benefits provided by
any potential policy. The figure below shows the costs
and the various damage degrees of 7 risk management
options. This chart shows the multi-objective trade-off
analysis conducted between two objectives - minimize
both cost and damage degree. Spending a certain
amount of money will enable you to decrease the risk of
a certain amount of damage by a given percentile.
Cost vs. Percentage of Degree Damage
$250,000
Option 3 & 4
combined
$200,000
Cost
Phase V: Filtering and Ranking using a Cardinal
Scale for Severity. This version of the filtering and
ranking uses a similar diagram to Figure 1; however,
there are probabilities associated with the likelihood
terms. The remaining sources of risk are applied to this
scale and are ranked in terms of severity again like in
phase III. Upon completion of this phase,
approximately 10-20 risks should still be apparent in
the analysis.
Phase VI: Risk Management. What can be done?,
What should be done?, and What are the trade-offs of
the options? Management options are developed and
applied to the final group of risk scenarios attained in
phase V. Looking at numerous possibilities for
managing the risks, one arrives at a set of Pareto
optimal options. One must remember that if
management options are implemented, the system will
be altered, thus phase VII addresses the potential future
problems.
Phase VII Safeguards Against Missing Critical
Items. It does this by; reviewing between inter / intradependencies of success scenarios and failures,
evaluating the risk policies against the previously
filtered out sources of risk, and revising the risk
management options developed in phase VI. By doing
this analysis, one gains insight into a number of
alternative management options that might have
otherwise been overlooked.
Phase VIII is the final stage and thus addresses
Operational Feedback. This looks at the methodology
as a whole in terms of the changing and dynamic nature
of risk assessment and management. Essentially, one
should be prepared to incorporate alternate and extra
means of analysis into this methodology in order to
maintain a complete model for risk assessment and
management.
(Haimes, Kaplan, and Lambert, 2001)
$150,000
Option 3
$100,000
$50,000
Option 2
Option 1
$0
0
10
20
30
40
50
Percentage of Degree Damage
RESULTS
The results of the Capstone project are comprised of
five individual case studies, each of which deployed the
Risk Filtering, Ranking, and Management methodology
from phase I through phase VI. Each case study
produced hundreds of risk scenarios that were
systemically filtered down to a top listing of critical
threats to the system. Management policies to mitigate
the risks were created specifically for each site. After
subjecting the policies to trade off analysis techniques a
smaller set of management policies were compiled for
each structure. The five infrastructures all shared some
common risks facing them, such as threats due to
terrorist attacks, both cyber and physical, as well as
natural hazards. The end result is a collection of risk
mitigation policies that can most effectively harden,
prevent an attack upon, or increase the recoverability of
180
Figure 2. – Multi-objective Trade-Off Analysis
This systemic risk assessment and management process
allows decision-makers to enact policies and projects
that truly benefit the public. Potential impacts of
implementing the framework may improve the
protection of areas, such as electric, water, and
telecommunication infrastructures. The final results
support the hypotheses that existing risk assessment and
management techniques can be applied to large-scale
infrastructures when managed correctly, and that there
is a definite need to protect the vulnerable
transportation infrastructures in Virginia and the U.S.
2001 Systems Engineering Capstone Conference • University of Virginia
REFERENCES
Clinton, President W. (1996) “Executive Order 13010,
establishing the President’s Commission on Critical
Infrastructure Protection (PCCIP),” The White House,
15 July.
study two critical bridge/tunnel structures in the state of
Virginia, applying the previously mentioned
methodologies. After graduation in May, Mr. Slagel
will be working for Pricewaterhouse Coopers in
Arlington, Virginia.
Garrick, B.J., and Kaplan, S. (1981) On the quantitative
definition of risk, Risk Analysis 1(1).
Haimes, Y. (1991) Total Risk Management, Risk
Analysis 11(2), 169-171.
Haimes, Y. (1998) Risk Modeling, Assessment and
Management. John Wiley & Sons, Inc., New York.
Haimes, Y., Lambert, J., and Kaplan, S. (2001) Risk
Filtering, Ranking, and Management Framework Using
Hierarchical Holographic Modeling. The Center For
Risk Management of Engineering Systems at the
University of Virginia.
BIOGRAPHIES
Scott B. Crenshaw is a fourth-year Systems
Engineering major from Richmond, VA, concentrating
in information systems and management. His major
contribution to the project was studying a command,
control, and communication transportation system
integral to a major urban area in Virginia. Mr.
Crenshaw’s future plans include attending graduate
school for Systems Engineering at the University of
Virginia in the fall after graduation in May.
Jason A. Wynegar is a fourth-year Systems
Engineering Major from Centreville, VA, concentrating
in computer information systems. Mr. Wynegar’s
primary contribution to the project was to study a large
interchange between two Virginia interstate highways.
Mr. Wynegar has accepted a position with
Pricewaterhouse Coopers in Arlington, VA, and will
begin work there this summer after graduating in May.
Krista L. Moses is a fourth-year System Engineering
major from Lima, NY, concentrating in military
systems. Miss Moses studied a complex bridge system
for her contribution to the project. Miss Moses will be
commissioned as an Ensign in the U.S. Navy in May
and will proceed to pilot school in June, where she will
train to become a naval aviator.
Zachary A. Slagel is a fourth year Systems
Engineering and Economics major from Richmond,
Virginia. His major contribution for the project was to
181
Download