Security & Vulnerability Assessment

In accordance with the CCPS design criteria on Security & Vulnerability Assessment, Bell Energy has developed a SVA Design and Audit Tool that helps companies identify security threats, the worst case consequences and the likelihood of an undesired event or attack. Prevention and Mitigation steps are proposed by our security experts.

The API/NPRA Security Vulnerability Assessment methodology provides the main steps and associated tasks for undertaking security vulnerability assessment studies:

  • Identify critical assets
  • Identify critical functions
  • Identify critical infrastructures and inter-dependencies
  • Evaluate existing countermeasures
  • Evaluate impacts
  • Select targets for further analysis
  • Adversary Identification
  • Adversary characterization
  • Target attractiveness
  • Define scenarios and evaluate specific consequences
  • Evaluate effectiveness of existing security measures
  • Identify vulnerabilities and estimate degree of vulnerability
  • Estimate risk of successful attack
  • Prioritize risks
  • Identify and evaluate countermeasures options
  • Prioritize potential enhancements

Each of the steps mentioned above are further associated with activities and tasks that help in identifying, preventing, controlling and mitigating security risks.

Bell Energy Clients

  • Saudi Aramco
  • SIEMENS
  • Tebodin Consultants & Engineers
  • Total Petrochemicals
  • ThyssenKrupp Uhde Engineering Services
  • Exxon Mobil Corporation
  • L & T
  • Abu Dhabi National Oil Company
  • Al Hosn Gas
  • ATKINS
  • Bharat Petroleum Corp. Ltd.
  • Cairn India Limited
  • Hindustan Petroleum Corporation Limited
  • Fugro Survey
  • Nabors Drilling
  • Petroleum Development Oman