Navigation path

THREVI2: Threat-Vulnerability Path Identification for Critical Infrastructures

THREVI2 is establishing a database which catalogues hazards posing a threat to critical infrastructures, and evaluates the vulnerability and resilience of the infrastructure.

Project dates 01/09/2012 - 31/08/2014
FundCIPS
TopicCIP
Total budget€345 845
EU contribution90%
Project CoordinatorNIER Ingegneria S.p.A (Italy)
Project Partners
  • Risk Governance Solutions (Italy)
  • Department of Management, Economics and Industrial Engineering, Polytechnic University of Milan (Italy)
  • Faculty of Engineering, Biomedical University of Rome (Italy)

Project Description

THREVI2 is creating a database linking hazards threatening critical infrastructure with the various infrastructure systems. The database characterises all hazards that may threaten or impact critical infrastructure systems, and evaluates the vulnerability and resilience capacities of the system components.

THREVI2 aims to create three types of taxonomies (hazards and threats, critical infrastructure systems, and interdependencies) to capture and logically organise the available information. The project then aims to merge these taxonomies by identifying existing vulnerability models to assess the types of impact and the extent of damage for the rest of the critical infrastructure and interdependent systems.

Benefits and results

The all-hazards dimension of the project will be addressed through a ‘hazards and threats’ taxonomy, based on literature review, studies of past events and experts’ analysis. Hazards will be characterised on the basis of a classical hazard assessment (magnitude, frequency and probability), whereas for some threats, in particular terrorist threats, the characterisation will rely solely on experts’ assumptions.

A taxonomy and topology analysis will be provided for each type of infrastructure system, while an independent taxonomy will consider the interdependencies between different critical infrastructure systems. The database will include a number of vulnerability models, describing the different consequences of each hazard.

Additional tools