Full Content is available to subscribers

Subscribe/Learn More  >

Managing and Protecting Infrastructure Assets

[+] Author Affiliations
Daniel C. Rees, Kenneth I. Rubin

Scientech, Inc., Kent, WA

Paper No. IMECE2003-42612, pp. 187-193; 7 pages
  • ASME 2003 International Mechanical Engineering Congress and Exposition
  • Engineering/Technology Management: Safety Engineering and Risk Analysis, Technology and Society, Engineering Business Management, and Homeland Security
  • Washington, DC, USA, November 15–21, 2003
  • Conference Sponsors: Engineering and Technology Management Group
  • ISBN: 0-7918-3728-9 | eISBN: 0-7918-4663-6, 0-7918-4664-4, 0-7918-4665-2
  • Copyright © 2003 by ASME


The events of September 11th focused renewed attention on protection of our nation’s critical infrastructure. Utilities across the nation have an increased awareness of risks and are recognizing the potential vulnerability of their physical assets, and also the assets embodied in their employees, their knowledge base, their information technology and their customers. Utilities must now grapple with the possibility that their infrastructure assets may be targets of direct physical threats — or serve as conduits for indirect physical threats. As the concern for protecting our nation’s infrastructure intensifies, each utility is being asked to reassess its ability to provide safe and reliable services to customers and communities as a whole. However, improvements to protection of utility assets must be performed with constraints of limited capital and operating budgets. Security threats from terrorist and related events are relatively new to the utility industry, so standard industry-wide protocols are just now being developed. Serious security practices have evolved in some discrete areas, such as high-risk government buildings, nuclear power plants, and airline terminals. Utility infrastructure physical assets are typically dispersed, so, standard approaches to security (developed for enterprises with highly centralized assets, such as nuclear weapons production facilities) are difficult to apply. Managers must then face a balancing act between demands for security and the resources needed to enact and finance those actions. This paper describes the Vulnerability Self Assessment (VSAT™) methodology and software that provides a structured, cost-effective approach for utilities to assess their vulnerabilities and to establish a risk-based methodology for making necessary changes. The VSAT™ methodology groups utility assets into the classes of People (utility staff), Physical Plant, Knowledge Base, Information Technology Platform, and Customers. The methodology and software are flexible, customizable, and user friendly. VSAT™ software is equally applicable to deliberately caused or natural disasters. In addition to a library of prototypical assets, included in the software application are threat and countermeasure libraries. As users proceed through self-assessments, VSAT™ automatically documents the analysis process during each step. VSAT™ helps users identify critical asset(s) and potential single points of failure (SPFs). The VSAT™ process culminates in a series of risk-reduction-cost reports that presents findings in clear and concise ways. This is important, because the goal is business continuity and, at the end of the day, VSAT™ provides solutions that enable utilities to mitigate risks of business interruptions at least cost.

Copyright © 2003 by ASME



Interactive Graphics


Country-Specific Mortality and Growth Failure in Infancy and Yound Children and Association With Material Stature

Use interactive graphics and maps to view and sort country-specific infant and early dhildhood mortality and growth failure data and their association with maternal

Citing articles are presented as examples only. In non-demo SCM6 implementation, integration with CrossRef’s "Cited By" API will populate this tab (http://www.crossref.org/citedby.html).

Some tools below are only available to our subscribers or users with an online account.

Related Content

Customize your page view by dragging and repositioning the boxes below.

Related eBook Content
Topic Collections

Sorry! You do not have access to this content. For assistance or to subscribe, please contact us:

  • TELEPHONE: 1-800-843-2763 (Toll-free in the USA)
  • EMAIL: asmedigitalcollection@asme.org
Sign In