By Topic

Risk assessment methodology for electric power transmission, RAM-TSM

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Biringer, B. ; Sandia Nat. Labs., Albuquerque, NM, USA

RAM-TSM includes both a methodology and a training program for assessing the security risk for high voltage power transmission systems. The methodology is based on the traditional risk equation: (Likelihood of Attack) * (Consequence) * (1-System Effectiveness) = Risk. A screening method is provided to help owners/operators prioritize their facilities and decide which require a full security risk assessment and warrant the expenditure of resources to perform it. The assessment process begins with a characterization of the facility including identification of the undesired events and the respective critical assets. Guidance for defining a design basis threat is included, as well as for using the definition of the threat together with the attractiveness of the target to estimate the likelihood of adversary attack at a specific facility. Relative values of consequence are estimated. Methods are also included for estimating the effectiveness of the security system against the adversary attack. Finally, relative risk is calculated. In the event that the value of risk is deemed to be unacceptable (too high), the methodology addresses a process for identifying and evaluating system upgrades in order to reduce risk. Upgrades include improving protection system effectiveness and/or mitigating consequences in order to reduce risk.

Published in:

Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on

Date of Conference:

11-14 Oct. 2004