echemi logo
Product
  • Product
  • Supplier
  • Inquiry
    Home > Chemicals Industry > Chemical Technology > Security risk assessment (1)

    Security risk assessment (1)

    • Last Update: 2022-02-11
    • Source: Internet
    • Author: User
    Search more information of high quality chemicals, good prices and reliable suppliers, visit www.echemi.com

    The purpose of security risk assessment is to provide security risk levels through qualitative or quantitative risk analysis and assessment, determine the current security management status, and provide a basis for security risk control


    (1) Definition of security risk assessment

    Any organization may have various hazards and potential safety hazards, which are potential risk factors for various damages


    The safety risk assessment must first identify the existing hazards, recognize the existing risks and understand their characteristics, and then use the probability of occurrence, the scope of the hazard, the magnitude of the possible damage and other indicators to evaluate, and then assess whether the existence of the risk can be tolerated, that is, the risk Whether the degree of risk has been low enough for the enterprise to consider its legal responsibilities, economic foundation, strategic objectives and policies, etc.


    (2) Security risk assessment method

    Dozens of safety risk assessment methods have been developed, such as fishbone diagram causal analysis, analogy, safety checklist, pre-hazard analysis (PHA), failure type and impact analysis (FMEA), accident tree (ETA), gray Umm-Kinney Method Safety Evaluation (LECD), Dow Chemical Company Law (DOW), Teikoku Chemical Company's Mond Method (MOND), Japan's Ministry of Labor and Labor's six-stage method, unit hazard quick sequencing method, hazard and operability research (HAZOP) and so on


    Table 4-1 Severity level of hazardous events


    The possibility of hazardous events is divided into five levels: A, B, C, D, and E, as shown in Table 4-2


    Table 4-2 Possibility level of hazardous events


    Take the severity level of the hazardous event as the column item of the table, and the possibility level of the hazardous event as the row item of the table, make a two-dimensional table, and give a qualitative weighted index at the intersection of the row and column, all weights The index forms a matrix.


    The elements in the matrix are weighted indexes, also known as risk assessment indexes


    Table 4-3 Examples of risk assessment index matrix method


    The size of the index in the matrix is ​​divided into categories according to acceptable levels to form risk acceptance criteria or risk judgment criteria


    Table 4-4 Qualitative Risk Level Judgment Criteria


    Related links: Practices and characteristics of security risks

     

     

    This article is an English version of an article which is originally in the Chinese language on echemi.com and is provided for information purposes only. This website makes no representation or warranty of any kind, either expressed or implied, as to the accuracy, completeness ownership or reliability of the article or any translations thereof. If you have any concerns or complaints relating to the article, please send an email, providing a detailed description of the concern or complaint, to service@echemi.com. A staff member will contact you within 5 working days. Once verified, infringing content will be removed immediately.

    Contact Us

    The source of this page with content of products and services is from Internet, which doesn't represent ECHEMI's opinion. If you have any queries, please write to service@echemi.com. It will be replied within 5 days.

    Moreover, if you find any instances of plagiarism from the page, please send email to service@echemi.com with relevant evidence.