About

Log in?

DTU users get better search results including licensed content and discounts on order fees.

Anyone can log in and get personalized features such as favorites, tags and feeds.

Log in as DTU user Log in as non-DTU user No thanks

DTU Findit

Conference paper

In Depth Hazards and Security Analysis for an Industrial Test Enclave for Methods Testing and Validation

In Book of Abstract of the 5th Sra Nordic Conference — 2019, pp. 28-28
From

Engineering Systems Design, Innovation, Department of Technology, Management and Economics, Technical University of Denmark1

Department of Technology, Management and Economics, Technical University of Denmark2

Innovation, Department of Technology, Management and Economics, Technical University of Denmark3

Institute for Energy Technology4

One of the challenges facing safety and security assessments is that when incident and accident investigations are made and the incident scenario described in detail, the scenario seldom matches those identified in risk analyses. There are several reasons for this. The main ones are that the hazards identified by risk analysis are usually prevented; and that the methods used for hazard identification do not sufficiently cover the range of problems which can arise in complex systems.

The OECD Halden Reactor Project has developed and constructed an industrial automation enclave [1] intended for detailed investigation of safety and security analysis methods. The installations is described as an enclave because it is isolated from possible outside influences, and more importantly, cannot affect/infect external systems when investigating security attacks.

The part of the project described here covers in depth risk analyses using methods intended for in depth safety analysis at the level where system weaknesses can exist. The methods so far tested are in deep FMEA, deep HAZID, HAZOP with lessons learned support, sneak path analysis, action error analysis of start-up and maintenance procedures, and system simulation with fault insertion for emergent hazards.

Several techniques for security assessment have also been applied, including security sneak path analysis.The studies show the extent to which completeness depends on the use of combinations of methods, and the degree of coverage which can be achieved.

Language: English
Year: 2019
Pages: 28-28
Proceedings: 5th SRA Nordic Conference
Types: Conference paper
ORCIDs: Chronopoulos, Christos and Piccolo, Sebastiano

DTU users get better search results including licensed content and discounts on order fees.

Log in as DTU user

Access

Analysis