A Methodology for the Identification of Critical Locations in Infrastructures
Author(s)
Lemon, Douglas M.
Downloadesd-wp-2004-01.pdf (864.5Kb)
Metadata
Show full item recordAbstract
The extreme importance of critical infrastructures to modern society is widely recognized. These infrastructures are complex, interdependent, and ubiquitous; they are sensitive to disruptions that can lead to cascading failures with serious consequences. Protecting the critical infrastructures from terrorism, human generated malevolent attack directed toward maximum social disruption, presents an enormous challenge. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to identify the critical locations in these infrastructures. By protecting the critical locations society achieves the greatest benefit for the protection investment. This paper presents a methodology for the identification of critical locations in infrastructures. The framework models the infrastructures as interconnected digraphs and employs graph theory and reliability theory to identify the vulnerable points. The vulnerable points are screened for their susceptibility to a terrorist attack, and a prioritized list of critical locations is produced. The prioritization methodology is based on multi-attribute utility theory. The methodology is illustrated through the presentation of a portion on the analysis conducted on the campus of the Massachusetts Institute of Technology.
Date issued
2004-06Publisher
Massachusetts Institute of Technology. Engineering Systems Division
Series/Report no.
ESD Working Papers;ESD-WP-2004-01