Skip to main content

Currently Skimming:


Pages 31-75

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 31...
... 31 The key risk assessment approaches discussed in Section 3 that involve concrete models or methodologies with suffi cient documentation or available information are further characterized in the matrices here. These matrices are designed to facilitate selection of a model for application to a hazmat transportation stakeholder's particular needs.
From page 32...
... 32 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 33...
... 33 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 34...
... 34 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 35...
... 35 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 36...
... 36 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 37...
... 37 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 38...
... 38 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 39...
... 39 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 40...
... 40 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 41...
... 41 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 42...
... 42 which is widely available, and some of which is security-sensitive or restricted to industry use. Se cu rit y CCPS Guidelines: Security Risk Prioritization Process See also §3.3.1, 4.2.5 -- -- -- -- -- -- -- -- -- -- - Center for Chemical Process Safety Highway Rail Marine Air Pipeline Chemical hazards, quantity transported per container, number of shipments, mode, interim storage, specific threat information, and the proximity to people, sensitive environmental areas, critical assets or infrastructure are all considered subjectively.
From page 43...
... 43 CCPS Guidelines: Security Vulnerability Assessment Process See also §3.3.1, 4.2.6 -- -- -- -- -- -- -- -- -- -- - Center for Chemical Process Safety Highway Rail Marine Air Pipeline Both internal and external threat information is combined with relative target attractiveness factors. Vulnerability is qualitatively assessed based on how well existing countermeasures can withstand or eliminate an attack.
From page 44...
... 44 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 45...
... 45 4.1.6 (Continued)
From page 46...
... 46 Readiness and Resiliency Assessment System (RRAS) See also §3.4.1.3, 4.2.16 -- -- -- -- -- -- -- -- -- -- - Oak Ridge National Laboratory Center for Transportation Analysis Highway Rail Marine Air Pipeline Input data is largely security sensitive and nondistributable.
From page 47...
... 47 4.1.7 (Continued)
From page 48...
... 48 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 49...
... 49 4.1.8 Security Measure Identification, Prioritization, and Evaluation Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 50...
... 50 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 51...
... 51 4.1.9 Security Risk Situational Awareness Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 52...
... 52 Name -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- - -- -- - Sponsor/Developer Mode Input(s) Output(s)
From page 53...
... 53 Sponsor/Dev. Users/Uses/Decisions Output(s)
From page 54...
... 54 Strengths (including data) Weaknesses Availability Barriers/Desired Improvements The methodology makes strong use of a 1.5 ratio for decision making when comparing the risks of two alternatives.
From page 55...
... 55 Strengths (including data) Weaknesses Availability Barriers/Desired Improvements Cost-effective approach for considering options that do not require more detailed assessment.
From page 56...
... 56 Strengths (including data) Weaknesses Availability Barriers/Desired Improvements Risk indices provide single annual risk number.
From page 57...
... 57 Component Key Sources of Data Assumptions, Limitations, Biases, and Availability Strengths (including data) Weaknesses Availability Barriers/Desired Improvements This is a very simple process that can be implemented with no additional data.
From page 58...
... 58 4.2.5 (Continued)
From page 59...
... 59 4.2.6 (Continued)
From page 60...
... 60 4.2.8 Chemical Manufacturer Risk Assessment Framework See also: §3.3.4 Sponsor/Dev. Users/Uses/Decisions Output(s)
From page 61...
... 61 4.2.9 Chemical Terrorism Risk Assessment (CTRA) Process See also: §3.4.3.1 Sponsor/Dev.
From page 62...
... 62 4.2.9 (Continued)
From page 63...
... 63 4.2.10 (Continued)
From page 64...
... 64 4.2.11 (Continued)
From page 65...
... 65 4.2.12 (Continued)
From page 66...
... 66 4.2.13 (Continued)
From page 67...
... 67 4.2.14 (Continued)
From page 68...
... 68 4.2.15 (Continued)
From page 69...
... 69 4.2.17 Risk-Based Preventative Radiological/Nuclear Detection Resource Allocation (CREATE Model) See also: §3.4.1.3 4.2.16 Readiness and Resiliency Assessment System See also: §3.4.1.3 Sponsor/Dev.
From page 70...
... 70 4.2.17 (Continued)
From page 71...
... 71 4.2.18 (Continued)
From page 72...
... 72 4.2.19 (Continued)
From page 73...
... 73 4.2.20 (Continued)
From page 74...
... 74 4.2.21 (Continued)
From page 75...
... 75 4.2.22 (Continued)

Key Terms



This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.