-
Categories
-
Pharmaceutical Intermediates
-
Active Pharmaceutical Ingredients
-
Food Additives
- Industrial Coatings
- Agrochemicals
- Dyes and Pigments
- Surfactant
- Flavors and Fragrances
- Chemical Reagents
- Catalyst and Auxiliary
- Natural Products
- Inorganic Chemistry
-
Organic Chemistry
-
Biochemical Engineering
- Analytical Chemistry
- Cosmetic Ingredient
-
Pharmaceutical Intermediates
Promotion
ECHEMI Mall
Wholesale
Weekly Price
Exhibition
News
-
Trade Service
The purpose of security risk assessment is to provide security risk levels through qualitative or quantitative risk analysis and assessment, determine the current security management status, and provide a basis for security risk control
(1) Definition of security risk assessment
Any organization may have various hazards and potential safety hazards, which are potential risk factors for various damages
The safety risk assessment must first identify the existing hazards, recognize the existing risks and understand their characteristics, and then use the probability of occurrence, the scope of the hazard, the magnitude of the possible damage and other indicators to evaluate, and then assess whether the existence of the risk can be tolerated, that is, the risk Whether the degree of risk has been low enough for the enterprise to consider its legal responsibilities, economic foundation, strategic objectives and policies, etc.
(2) Security risk assessment method
Dozens of safety risk assessment methods have been developed, such as fishbone diagram causal analysis, analogy, safety checklist, pre-hazard analysis (PHA), failure type and impact analysis (FMEA), accident tree (ETA), gray Umm-Kinney Method Safety Evaluation (LECD), Dow Chemical Company Law (DOW), Teikoku Chemical Company's Mond Method (MOND), Japan's Ministry of Labor and Labor's six-stage method, unit hazard quick sequencing method, hazard and operability research (HAZOP) and so on
Table 4-1 Severity level of hazardous events
The possibility of hazardous events is divided into five levels: A, B, C, D, and E, as shown in Table 4-2
Table 4-2 Possibility level of hazardous events
Take the severity level of the hazardous event as the column item of the table, and the possibility level of the hazardous event as the row item of the table, make a two-dimensional table, and give a qualitative weighted index at the intersection of the row and column, all weights The index forms a matrix.
The elements in the matrix are weighted indexes, also known as risk assessment indexes
Table 4-3 Examples of risk assessment index matrix method
The size of the index in the matrix is divided into categories according to acceptable levels to form risk acceptance criteria or risk judgment criteria
Table 4-4 Qualitative Risk Level Judgment Criteria
Related links: Practices and characteristics of security risks