O'Reilly logo

Plant Design and Operations by Ian Sutton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 16

Security

Most of the people who work at process facilities have great difficulty comprehending the mind-set of someone who deliberately and willfully wishes to cause massive death and destruction. An implicit assumption behind a process hazards analysis (PHA), e.g., is that, “Everyone wants to do a safe job—accidents truly are accidents—therefore, this PHA will exclude malicious acts.” Unfortunately, this mental paradigm of “general goodwill” does not always hold. This chapter shows how to identify security vulnerabilities at a process plant site and the reasonable actions that can be taken to prevent security problems from occurring.

Keywords

Security; Security Vulnerability Analysis; process safety; Threatening calls; Rings of protection; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required