Risk Assessment of Hostile Attacks Using Analytic Network Process Model

Document Type : Original Article

Abstract

Investigating the factors and identifying the type of potential threats and risks of important assets at the time of incidents are of the key measures in reducing vulnerability with the passive approach. Therefore, in order to develop the most likely scenario to prevent or reduce vulnerability and the consequences, we need to develop comprehensive indicators and risk analysis techniques. In the present models, all stages of risk analysis are linear, while it can be a major weakness in the evaluation process.  For example, in the asset screening stage, an asset that does not have a high value in terms of assets is eliminated, but with high potential for large system vulnerabilities. In fact, due to the nature of the linearity of the models, the asset is eliminated in the first stage and prevents evaluation in the next steps (vulnerability assessment). Due to the weakness of linear models for determining the priority of the vulnerability of the three nuclear sites, the network analysis process model has been used. The research method of the present study is based on the purpose of the developmental type. From the nature of the subject, a description of the library resources and the views of the elites to examine the proposed models have been used. Finally, while explaining the indicator, the model of the network analysis process is described in order to evaluate the final risk, which is the most risk related to sites A, B, C.

Keywords


  1. M. Garcia-Melon, J. Ferris-Onate, J. Aznar-Bellver, P. Aragonés-Beltran, and R. Poveda-Bautista, “Farmland appraisal based on the analytic network Process,” Journal of Global Optimization, vol. 2, pp. 143-155, 2008.##
  2. https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology#The_OWASP_Risk_Rating_Methodology##
  3. زارعی، اسماعیل، در محمدی، علی، ارزیابی ریسک نیمه کمی و کمی در صنایع فرایندی، انتشارات فن آوران، شماره1392،12.##
    1. A How-to Guide to Mitigate Potential Terrorist Attacks against Buildings /FEMA 452 /, p. 18, January 2005.##
    2. توفیق، فیروز، ارزشیابی چند معیاری در طرح ریزی کالبدی، مجله آبادی، ص. 44، 1372.##
    3. پژوهشکده پدافند غیرعامل دانشگاه صنعتی مالک اشتر، ارزیابی ریسک تاسیسات صنعتی، ص. 64، 1392..##
    ##مومنی، منصور، شریفی سلیم، علیرضا، مدل ها و نرم افزارهای تصمیم گیری چند شاخصه، انتشارات گنج شایگان، شماره 90، 1394
    1. ذوالقدر، محمد، الگوی ارزیابی ریسک امنیتی و خارجی سامانه های آبرسانی، پایان نامه کارشناسی ارشد، ص. 135، 1391.##
    2. رزقانی، سیدهادی، و همکاران، تحلیل ریسک اهمیت مراکز حیاتی، حساس و مهم کلانشهر مشهد، فصلنامه مطالعات برنامه ریزی شهری، ص. 12، 1392.##
    3. زبردست، اسفندیار، کاربرد فرایند تحلیل شبکه، نشریه هنرهای زیبا، ص. 16، 1389.##
      1. T. L. Saaty and J. M. Alexander, “The Thinking with Models, Mathematical Model in Physical and Social Science, Oxford Pergamon Press, pp.48-155, 1988.##
      2. Y.-H. Lin, K.-M. Tsai, and W.-J. Shiang, “Research on using ANP to establish a performance assessment model for business intelligence systems,” Expert Systems with Application, vol. 36, pp. 4135-4146, 2009.##
Volume 9, Issue 2 - Serial Number 2
September 2029
Pages 83-94
  • Receive Date: 29 May 2017
  • Revise Date: 04 March 2019
  • Accept Date: 19 September 2018
  • Publish Date: 23 August 2018