Conceptual Frameworks for Vulnerability Assessment

  • Wolfgang Kröger
  • Enrico Zio


Critical Infrastructures (CIs) have basic traits in common such as large-size, wide-area coverage, complexity and interconnectedness but show significant differences in detail, even when limited to physical-engineered CIs. The challenges for understanding, modeling and analyzing these systems with regard to vulnerability are immense and far away from being resolved. Approaches can be of two types, empirical and predictive, or a combination of both, as they complement each other (Johansson and Hassel 2010). By empirical investigations, previous events are studied in order to understand the behavior of CIs and the (inter)dependencies between them as well as to identify patterns, while predictive approaches aim to model the behavior of single or a group of CIs to find potential high consequence cases and non-obvious vulnerabilities.


Vulnerability Assessment Critical Infrastructure Screening Analysis Interconnected System Vulnerability Analysis 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. Aven T (2010) A unified framework for risk and vulnerability analysis covering both safety and security. Reliab Eng Syst Safe. doi: 10.1016/j.ress2006.03.008
  2. Dudenhoeffer DD, Permann MR, Manic M (2006) CIMS: A framework for infrastructure interdependency modeling and analysis. In: Proceedings of the 38th conference on winter simulation, Monterey, California, 2006Google Scholar
  3. Eusgeld I, Kröger W (2008) Comparative evaluation of modeling and simulation technique for interdependent critical infrastructures. In: Proceedings of PSAM9, Hong Kong, 18-23 May 2008, pp. 49–57Google Scholar
  4. Eusgeld I, Kröger W, Sansavini G, Schläpfer M, Zio E (2009) The role of network theory and object-oriented modeling within a framework for the vulnerability analysis of critical infrastructures. Reliab Eng Syst Safe 94:954–963. doi: 10.1016/j.ress.2008.10.011 CrossRefGoogle Scholar
  5. Johansson J, Hassel H (2010) An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliab Eng Syst Safe. doi: 10.1016/j.ress2010.06.010
  6. MIA (2010) Definition of a methodology for the assessment of mutual interdependencies between ICT and electricity generation/transmission infrastructures. Final report, September 2010, Italian National Agency for New Technology, Energy and Environment, ItalyGoogle Scholar
  7. Piwowar J, Châtelet E, Laclémence P (2009) An efficient process to reduce infrastructure vulnerabilities facing malevolence. Reliab Eng Syst Safe 94:1869–1877. doi: 10.1016/j.ress2009.06.009 CrossRefGoogle Scholar
  8. Qu G, Rudraraju J, Modukuri R, Hariri S, Raghavendra CS (2002) A framework for network vulnerability analysis. ITL Lab, the University of Arizona, University of Sothern CaliforniaGoogle Scholar
  9. Utne IB, Hokstad P, Vatn J (2009) A structured approach to modeling interdependencies in risk analysis of critical infrastructures. In: Proceedings of the European safety and reliability conference, ESREL 2009, Prague, Czech Republic, 7–10 September 2009Google Scholar

Copyright information

© Springer-Verlag London Limited  2011

Authors and Affiliations

  1. 1.Mechanical and Process Engineering DepartmentETH ZurichZurichSwitzerland
  2. 2.Ecole Centrale Paris, Laboratoire Génie IndustrielChatenay-Malabry CedexFrance

Personalised recommendations