Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Frequency of attack and the safeguards and security risk evaluation process. Application of the Analytic Hierarchy Process

Conference ·
OSTI ID:61345
 [1]
  1. Ogden Environmental and Energy Services Co., Fairfax, VA (United States)
Political and fiscal considerations are driving safeguards and security policy changes. Frequent topics of discussion as a means of addressing both cost effectiveness and the perceived reduction in threat to Department of Energy facilities is to change the current valuation of the Frequency of Attack in the ``Conditional risk Equation`` to a value which reflects this low probability of attack. A major premise of this paper is that the low probability of an attack on a nuclear facility in the United States is due to the level of deterrence, mitigation, and prevention of the protection systems, not a lack of adversary interest in nuclear facilities. Though nuclear facilities would seem to be ideal attention getting targets for terrorists, the protection system has a deterrent effect, making them ``hard`` targets, thus lowering the probability that they will be attacked. The purpose of this paper is to present an approach to taking credit for those qualitative protection system elements which effect the probability that an attack will occur against a sensitive facility in the United States. Complex problems such as assessing values to large and multi-faceted protection programs require a rigorous analytical approach. Analytic tools can assist in breaking down large, complex problems into their component parts. The Analytic Hierarchy Process (AHP) is a methodology which is ideally suited for structuring complex problems such as determining how effective the qualitative protection system elements are against a given adversary type and across a specific path to a target. This approach is rigorous, provides significant detail on the rationale for decisions made, and is flexible in adjusting to changing situations. Examples chosen to demonstrate this rigorous methodology are insider adversary types within the DOE ``Design Basis Threat`` policy.
OSTI ID:
61345
Report Number(s):
CONF-930749--
Country of Publication:
United States
Language:
English

Similar Records

Assessment of Physical Security Modeling and Simulation in the Vulnerability Assessment Process
Technical Report · Fri Feb 28 23:00:00 EST 2025 · OSTI ID:2559059

Development of computer-based analytical tool for assessing physical protection system
Journal Article · Thu Jan 21 23:00:00 EST 2016 · AIP Conference Proceedings · OSTI ID:22494521

Dynamic vulnerability assessment.
Technical Report · Wed Sep 01 00:00:00 EDT 2004 · OSTI ID:919634