2021
DOI: 10.18280/ijsse.110403
|View full text |Cite
|
Sign up to set email alerts
|

A Review of Single and Multi-Hazard Risk Assessment Approaches for Critical Infrastructures Protection

Abstract: One of the greatest societal challenges is represented by Critical Infrastructures (CIs) protection. To minimize the impacts of man-made and natural threats, a series of risk assessment techniques have been developed. This work aims to critically compare stateof-the-art risk assessment methodologies for CIs protection, to find the pros and cons of each of them. The paper firstly defines the main challenges in performing the risk assessment of CIs, which have been identified in data availability and in modellin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 42 publications
0
3
0
Order By: Relevance
“…In Figure 9, it is demonstrated that the implementation of security policies based on this proposal had a positive impact. According to the author [24], in order to set security policies in the IT infrastructure it is recommended to do a report before and after its implementation [25], to do an accurate comparison and know if the changes did work or need to be reformulated back to the initial stage. Regarding this, during the developing process of this proposal, it was taken into consideration the evaluation of preconditions and postconditions of these assets and security policies in the IT infrastructure to evaluate the risks and show the input of the new updates and changes (see Table 4).…”
Section: Comparison Chartmentioning
confidence: 99%
“…In Figure 9, it is demonstrated that the implementation of security policies based on this proposal had a positive impact. According to the author [24], in order to set security policies in the IT infrastructure it is recommended to do a report before and after its implementation [25], to do an accurate comparison and know if the changes did work or need to be reformulated back to the initial stage. Regarding this, during the developing process of this proposal, it was taken into consideration the evaluation of preconditions and postconditions of these assets and security policies in the IT infrastructure to evaluate the risks and show the input of the new updates and changes (see Table 4).…”
Section: Comparison Chartmentioning
confidence: 99%
“…In addition to covering theoretical and experimental themes in this area, there are numerous studies that dealt with numerical analysis using various programs in the study of local cleanliness near and at the ports, and the most significant of these researches [6][7][8][9][10][11][12][13][14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Many researches made in recent years at metallurgical plants testify that working conditions were and keep being hazardous and injurious [1,2]. Commonly, workers in metallurgical facilities are exposed to a complex of hazardous agents during all working hours: high noise level, dust and gas pollution [3]. To assess working conditions, it becomes necessary to take into account the combined influence of the above factors.…”
Section: Introductionmentioning
confidence: 99%