TY - JOUR
T1 - Comparing physical protection strategies against insider threats using probabilistic risk assessment
AU - Björkman, Kim
AU - Holmberg, J.-E.
AU - Mätäsniemi, Teemu
N1 - This work was funded by the Radiation and Nuclear Safety Authority (STUK).
TurvaPRA_2019 123342, GG_PIETU_BA16_2020 125587, GG_ BA56_Ressu_2022 132607
PY - 2022/5
Y1 - 2022/5
N2 - Insiders pose a unique challenge to the safety and security of a nuclear facility. They can take advantage of their access rights and knowledge of the plant to bypass, e.g., physical protection elements. In this paper, we present a risk-informed approach to analyze the most plausible ways for an intelligent insider to cause an unwanted outcome (e.g., plant disturbance) by accessing critical locations and preventing the functioning of critical systems. The strength of different protection strategies can be compared using security risk metrics. The starting point of the method is the logical model of a probabilistic risk assessment. The logic model, in the form of minimal cut sets, identifies critical failure combinations that need to be prevented. The case study we performed demonstrated that the approach is usable and should be applicable to realistic facilities. In the analyses, the unwanted outcome to be protected can be basically any outcome that can be represented by minimal cut sets.
AB - Insiders pose a unique challenge to the safety and security of a nuclear facility. They can take advantage of their access rights and knowledge of the plant to bypass, e.g., physical protection elements. In this paper, we present a risk-informed approach to analyze the most plausible ways for an intelligent insider to cause an unwanted outcome (e.g., plant disturbance) by accessing critical locations and preventing the functioning of critical systems. The strength of different protection strategies can be compared using security risk metrics. The starting point of the method is the logical model of a probabilistic risk assessment. The logic model, in the form of minimal cut sets, identifies critical failure combinations that need to be prevented. The case study we performed demonstrated that the approach is usable and should be applicable to realistic facilities. In the analyses, the unwanted outcome to be protected can be basically any outcome that can be represented by minimal cut sets.
KW - Insider
KW - Protection strategy
KW - Minimal cut set
KW - Security measure
KW - Security risk metrics
UR - http://www.scopus.com/inward/record.url?scp=85126844109&partnerID=8YFLogxK
U2 - 10.1016/j.nucengdes.2022.111738
DO - 10.1016/j.nucengdes.2022.111738
M3 - Article
SN - 0029-5493
VL - 391
JO - Nuclear Engineering and Design
JF - Nuclear Engineering and Design
M1 - 111738
ER -