Opcion 9
Opcion 9
Abstract—Physical security risk analysis represents a following the improvements of planned activities to step-up
fundamental tool to evaluate the threats regarding an the levels of protection of a given site.
organization and it can be divided into distinct groups,
represented by: qualitative, semi-quantitative, quantitative, In our case, the Layers of Protection Analysis (LOPA)
and mixed. The method of analysis is very important because it method, initially structured and developed for industrial
also allows to measure the increase in the level of security plants safety (such as chemical industry), has been revised
following the improvements of planned activities to step-up the and adapted to the physical security risk, providing
levels of protection of a given site. In our case, the Layers of interesting and useful results.
Protection Analysis (LOPA) method, initially structured and
developed for industrial plants safety (such as chemical LOPA represents a semi-quantitative tool. As a risk
industry), has been revised and adapted to the physical assessment methodology, LOPA uses order of magnitude
security risk, providing interesting and useful results. categories for initiating event frequency, consequence
The purpose of this paper is to illustrate a novel method for severity, and the likelihood of failure of independent
physical security risk analysis based on LOPA that represents protection layers (IPLs) to estimate risks. Objectives of
a general tool for any kind of organization. LOPA are to determine if risks can be tolerated by asking if
there are enough layers of protection against an accident
Keywords—Physical security risk analysis, LOPA, Layers of scenario and if supplementary independent protection layers
Protection Analysis. are needed.
The purpose of the proposed physical security adapted
I. INTRODUCTION LOPA (PSA-LOPA) technique is to define and quantify the
Physical security risk analysis represents a fundamental risk of occurrence of a dangerous security scenario and to
tool to evaluate the threats regarding an organization, establish if, within a site, there are enough physical security
allowing a subsequent optimal security management, even measures, defined as levels of protection (layers), such as to
using properly supporting integrated technological evaluate the physical security risk acceptability.
framework based on Internet of Things (IoT) / Internet of The proposed methodology is very versatile as it adapts
Everything (IoE) which can connect people, things (mobile both to the design of a new site, allowing to insert the right
terminals, smart sensors, devices, actuators; wearable number of levels of protection, and to the analysis of an
devices; etc.), data / information / knowledge and processes existing site, allowing, if necessary, to add new levels of
[1 - 6]. protection in a way that allows the risk to be acceptable.
Risk analysis can be divided into distinct groups, The purpose of this paper is to illustrate a novel method
represented by: qualitative, semi-quantitative, quantitative, for physical security risk analysis based on LOPA that
and mixed [7 - 15]. represents a general tool for any kind of organization.
Qualitative risk analysis is useful in doing a preliminary
overview of the threats of an organization, but it does not II. THE LAYERS OF PROTECTION ANALYSIS (LOPA)
provide quantitative results.
The proposed Physical Security Adapted Layer of
Quantitative risk analysis is fundamental in giving the Protection Analysis (PSA-LOPA) technique allows to
exact values of different threats. It can be a very complex identify the exact number of physical security protections
and expensive process. (intrusion detection system, access control, video
surveillance etc.) that the site needs and the related
Semi-quantitative risk analysis represents an
performances. It also allows the analyst to avoid
intermediate analysis between qualitative and quantitative
overestimating the risk as in the case of including redundant
analysis.
protective devices that sometimes result to be useless,
Mixed risk analysis joins different techniques. thereby reducing any costs involved [16 - 19].
The method of analysis is very important because it also For these reasons, the correct application of the PSA-
allows to measure also the increase in the level of security LOPA technique represents a simple and effective screening
method to establish not only what physical security
• Identification of the triggering cause (Initiating Since physical security is generally applied according to
event). layers of protection so that any intruders find various levels
of protection such as perimeter protection, video
• Estimate of the frequency of occurrence of the surveillance, technological barriers, sensors etc. before
Initiating Event. reaching the desired target, LOPA method is very suitable
since it is necessary to invert the considered flow of risk.
• Identification of any other factors (Enabling Factors)
that, coupled with the Initiating Event, give rise to the In fact, LOPA considers the different level of protection
scenario. starting from the target and proceeding towards various
levels of protection that could progressively produce
• Evaluation of the actual time in which the risk is damages.
manifested (Time at Risk).
In the PSA-LOPA the processes are properly reversed,
• Identification of independent protections considering the various levels of protection as a sort of
(Independent Protection Layers, IPLs). progressive shields to avoid that an intruder could reach a
• Calculation of the probability of failure of the given target, producing the expected damages (Fig.s 1 - 3).
physical security protections (Probability of Failure
on Demand, PFD).
• Evaluation of credits.
• Evaluation of the acceptability of risk and possible
improvement activities.
To carry out the risk analysis it is necessary to calculate
how much the existing PSPs can reduce the probability that
the scenario will occur. To do this, the concept of ‘credit’ is
used. The definition of credit is closely linked to the
probability of failure, associated with each individual PSPi,
according to the following equation [16 – 19]:
(1)
Once the individual credits have been evaluated, the
PSA-LOPA analysis is performed with the calculation of the
risk coefficient, relative to the k scenario, using the
following equation [16 – 19]:
Fig. 1. Schematic example of different layers of protection of a single
target.
(2)
where:
• TF is the Target Factor.
• FI is the opposite of the logarithm of the frequency of
occurrence of the Initiating Event.
• FE is the opposite of the logarithm of the frequency of
occurrence of the Enabling Factor.
• IT is the index of the Time at Risk.
• IPLs are the Independent Protection Layers that, in
our case, represents the physical security protections,
or levels of protections, that intervene following the
IE.
Damage
level of
R (PSA-
• the FI factor was assumed to be equal to 1, since the TF
LOPA)
RSS PFD
intrusion security system is evaluated when the
intrusion has already happened.
• The IT factor is not considered for simplicity even if
SEVERE
Requested level of
Actual level of
performance
performance
Damage faceable by failure rate is multiplied for the percentage of visual
Estimated
Target the actual level of
damage
coverage of considered area (i.e. equal to 1 if all the
protection considered area is covered).
Once individuated all the targets, it is possible to
calculate for each target Ti, by means of the related level of
Target 1 LIMITED LIMITED 2 2 protections P1i, P2i, P3i and, using the previous equations, the
related PSA-LOPA risk factor Ri, obtaining the actual
physical security level of protection of each target of the
Target2 MODERATED SEVERE 3 5 considered site.
At this point it is possible to create a resuming table
Target 3 LIMITED MODERATED 2 3 (Tab. II) where the first column represents the
individualized targets, the second column represent potential
Target 4 NEGLECTABLE HIGH 1 4
damages as determined by PSA-LOPA (using Eq.(1) and
Eq.(2)), the third column represents the expected damage
calculated using the results of initial qualitative analysis
Target 5 NEGLECTABLE HIGH 1 4 converted using Tab. I, the fourth column the actual level of
performance of the security protections and the fifth column
the requested level of performance of the security protection
Target 6 NEGLECTABLE HIGH 1 4 necessary to face the expected damages (both converted
using Tab. I).
Target 7 NEGLECTABLE HIGH 1 4 The obtained results allow to evaluate immediately if the
performance level of protections of the single targets, and
3 5
therefore of the entire site, are suitable or if it is necessary to
Target 8 MODERATED SEVERE
enforce the existing layers of protection of each target
(increasing for example their reliability) or increase the
Target 9 MODERATED SEVERE 3 5 number of them to reach the requested performance level.
Tab. II can also be represented using a proper histogram
graph to have immediately a clear view of the situation, as
Target 10 NEGLECTABLE ELEVATED 1 4 shown in fig. 4, or in another synthetic way by means of a
radar graph representation, as shown in fig. 5.
Target 11 MODERATED SEVERE 3 5