scholarly journals The UAVs threat to airport security: risk analysis and mitigation

2019 ◽  
Vol 9 (2) ◽  
pp. 63 ◽  
Author(s):  
John Pyrgies

Purpose: This research studies the UAV incidents in the vicinity of worldwide airports in order to deliver a quantitative and qualitative analysis of this phaenomenon, to analyse the risks associated to this threat and propose mitigation measures that brings this risk to an ‘acceptable’ level.Methodology: A population of 139 ‘serious UAV incidents in the vicinity of worldwide airports’ has been constituted on the basis of the FAA and NASA databases and articles published on the Web by online media. This phaenomenon has then been analysed quantitatively using descriptive statistics techniques and qualitatively by analysing in-depth some representative incidents. A risk analysis has then been performed based on the FAA Safety Risk Management 5-steps process to identify the hazards i.e. the root causes of those UAV incidents, determine their outcome i.e. negative consequences that jeopardize airports objectives and assign them a severity level and likelihood i.e. frequency level. Analysed risks have then been assessed based on FAA ARP Risk Matrix. Mitigation measures (prevention, deterrence, denial, detection, neutralisation) have been identified following a ‘Defence-in-Depth’ approach.Findings: The findings of the study are that those UAV incidents are more numerous than anticipated and happen higher and further from the airports than expected: they happen not only in CTRs but also in TMAs. This has an impact on the mitigation measures that shall not only be deployed at airports side but also be on-boarded in manned aircrafts.Originality: To our knowledge, no study has combined different sources to constitute such a population focused on ‘serious’ UAVs incidents around airports worldwide, has applied the official FAA Safety Risk Management process to assess this risk and followed a structured ‘Defence-in-Depth’ approach typically used in Cybersecurity to mitigate this risk.Keywords: Airport security and safety, Unmanned Aerial Vehicles (UAVs) threat, Risk analysis and mitigation, Counter-UAVs technologies.

2021 ◽  
Vol 14 (01) ◽  
pp. 77-86
Author(s):  
Bhima Shakti Arrafat

Every practical activity carried out by student at Aircraft Engineering Departement, then these activities have risks that need mitigation measures. In safety risk management requires departement to conduct an assessment of the risks that can occur from an activity using hazard identification, risk assessment and mitigation. By identifying types of hazards, assessing risks, getting results in the form of risk matrix and risk level and identifying mitigation actions that can be taken and accepted. Furthermore, it produces hazard identification and risk assessment & mitigation (HIRAM) documents, and controls risks to acceptable and tolerable levels with mitigation measures. Safety risk management which is one of the standards in implementing safety management system in Aircraft Engineering Departement can be fulfilled.


2020 ◽  
Vol 8 (2) ◽  
pp. 63-70
Author(s):  
Veronika Karkovska

Purpose. The article explores the topical topic of assessing the security risk of public servants. One of the main responsibilities of public authorities is to protect national security, that is, to protect the country and the community from threats related to disorderly conduct and welfare. Relevance. The urgency of the problem of assessing the risk of public servants is to research and substantiate the appropriate methodology for the effectiveness of the assessment. The recommended methodology for risk assessment is unique in that the main focus is on the risks posed by persons having legitimate access to the assets of public authorities. It is simple, reliable, flexible and transparent. It can be used on its own or as a supplement to an existing risk assessment program. Although the guidance explains how to check the risks posed by a person to a valuable asset, it does not attempt to indicate which of these assets is the most important or which employee group may be the most threatening. Results. The recommended risk assessment methodology provides the basis for the work, but in order for this work to be successful in accordance with the methodology, it is necessary to identify appropriate positions in the public authority for professionals with their further access to the necessary information. The stages of the risk assessment process highlight the threat identification and vulnerability assessment. It has been established that the risk assessment process consists in the importance of following the risk assessment process step by step and the lack of assumptions about the final results. Therefore, the article examines the risk assessment process carried out at the appropriate levels. Conclusions. It turns out that risk assessments are most effective when they are an integral part of the risk management process. This helps to transform risk assessment into action. The best results are achieved when the risk assessment team is composed of: employees and security teams responsible for risk management, persons with deep knowledge of specific areas of activity of employees, external specialists in the field of risk assessment. To maximize the benefits of employee safety risk assessment: Risk assessment requires discussion and benefits from the exchange of views from various areas of government.


2019 ◽  
Vol 1 (1) ◽  
pp. 35-44
Author(s):  
Dorota Wojtyto ◽  
Dariusz Rydz ◽  
Michał Pałęga ◽  
Aleksader S. Arbuz

AbstractThe article presents the Job Safety Analysis for a Glass Production Line Operator's Workstation in the context of the Risk Management Process. The main tasks performed by the worker have been defined, and then risks associated with each activity and preventive actions have been identified. On this basis, for the Health & Safety risk analysis and assessment, criteria have been established, which take into account the actual exposure to risks and their probability and results.


2019 ◽  
Vol 16 (6) ◽  
pp. 60-77
Author(s):  
E. V. Vasilieva ◽  
T. V. Gaibova

This paper describes the method of project risk analysis based on design thinking and explores the possibility of its application for industrial investment projects. Traditional and suggested approaches to project risk management have been compared. Several risk analysis artifacts have been added to the standard list of artifacts. An iterative procedure for the formation of risk analysis artifacts has been developed, with the purpose of integrating the risk management process into strategic and prompt decision-making during project management. A list of tools at each stage of design thinking for risk management within the framework of real investment projects has been proposed. The suggested technology helps to determine project objectives and content and adapt them in regards to possible; as well as to implement measures aimed at reducing these risks, to increase productivity of the existing risk assessment and risk management tools, to organize effective cooperation between project team members, and to promote accumulation of knowledge about the project during its development and implementation.The authors declare no conflict of interest.


Author(s):  
Ye. Bolotina ◽  
◽  
O. Shubna ◽  
A. Borodai ◽  
N. Steshenko ◽  
...  

The article considers the specifics of the functioning of TNCs, their current activities in the investment market. TNCs are currently one of the most important actors in international economic relations. The investment activity of transnational corporations has a direct impact on the balance of payments, production volumes, foreign trade turnover, employment, and the competitiveness of the host economy. The key features of political risk management of TNCs are identified and characterized. The political risks of TNCs are related to their interpretation, classification and methods. The means of reducing the degree of risk include: risk avoidance, retention, risk transfer. Ways to reduce the degree of risk include: diversification, acquisition of additional information, limitation, insurance, hedging. It has been proven that the main advantage of risk communications as an effective ancillary way to manage the political risks of TNCs at the state level, especially in the early stages of public policy making, is that it allows decision makers to better and timely inform stakeholders about risks. and to effectively exchange data between different parts of the public administration system, including effective mitigation measures. The main directions for TNC investment in 2018 are analyzed. The negative consequences of TNCs and ways to overcome them are identified.


2021 ◽  
Author(s):  
◽  
Toni Kekez

Many river basins are experiencing frequent flooding events with significant economic and other losses due to intensive precipitation as well as other atmospheric and hydrological conditions. European Flood Directive defined flood risk as a combination of flooding probability and possible adverse consequences on people, assets, cultural heritage and environment. Flood risk management considers implementation of different measures for mitigation and prevention of possible negative consequences related to flooding. Uncertainty can strongly affect the flood risk management process, especially near and during the flood event. A framework is proposed for implementation of uncertainty related to behavior of the endangered system in the flood risk assessment, in order to improve the decision-making process during the flood emergency response. The proposed framework is validated on the City of Slavonski Brod pilot site, where the results demonstrated that there is a significant flood hazard still present due to possible weir failure, despite the improvement of flood defense measures. Furthermore, the results demonstrated how flood risk value can significantly decrease by properly evacuating the affected population. Flood risk management on a strategic level requires a monetary quantification of possible flood risk, which is performed by calculating expected annual damage (EAD) based on the combination of flooding event probability and corresponding damages. A semi-analytic methodology is presented for estimation of expected annual damage based on the factor graph model, which enables integration of entire probability space as well as flexibility in defining input data. Furthermore, a novel approach is presented for definition of annual damage distribution based on first and second statistical moment and by employing Beta distribution. By analyzing the annual damage distribution as well as impact of different sources of uncertainty, the results demonstrated that there is a significant impact of extreme events with low occurrence probability on the expected annual damage.


2018 ◽  
pp. 1299-1317
Author(s):  
Neila Rjaibi ◽  
Latifa Ben Arfa Rabai

This chapter presents the security concepts terminologies (threat, risk, security risk management, security risk management process, security threat model) and present the state of the art of security risk management models, compare and discuss strengths and weaknesses of such models. Then it presents the Mean Failure Cost (MFC) model for quantifying security threats as a rigorous measure of cyber security, and as a cascade of linear models in order to estimate the system security using the loss of a given stakeholders as a result of security breakdown. Finally it presents an overview of the applicability of the MFC measure to e-systems. In the conclusion, the chapter criticizes the MFC Cyber Security Measure and presents an overview of different perspectives.


2017 ◽  
Vol 22 (4) ◽  
pp. 276-280
Author(s):  
Soňa Jirásková

Abstract This paper analyses financial risk management at the Ministry of Defence of the Slovak Republic. In its first part, the author defines the basic terms related to risk management, explains the negative consequences of risks and points to the importance of financial risk management. The second part of the paper is concerned with the risk management process at the Ministry of Defence of the Slovak Republic relating to financial management.


2014 ◽  
Vol 571-572 ◽  
pp. 1129-1132
Author(s):  
Tao Xu

Fuzzy Analytic Hierarchy Process (FAHP) has been applied widely in risk measurement. In this paper, we have applied FAHP to the risk measurement of an e-commerce business. The results indicate that FAHP can reveal more details of risks. It is also helpful for the e-commerce businesses to improve their risk management process.


Author(s):  
Piotr MAKOWSKI

This article is devoted to the diagnosis of problems arising from risk management obligations under the safety management system implemented in civil organisations of certified air operators (carriers). Focus was on the use of quantitative methods in safety risk analysis. The idea of an approach to determine the probability of accidents and serious incidents based on the intensity of symptoms with lower consequences and risk factors as a function of time or number of performed air operations was proposed, based on Markov discrete processes [6,10-12,16]. The essence of this approach is explained by the mathematical model of Runway Excursion probability during landing operations. The concept of improvement of operators' cooperation in the exchange of information about safety indicators by profiling the organisation was presented. The last proposal concerns the construction of a comprehensive risk assessment indicator using a safety risk matrix.


Sign in / Sign up

Export Citation Format

Share Document