Fault Tree Analysis (FTA)

Introduction

The fault tree analysis, also known as FTA, is a model used to understand how systems or processes fail. Furthermore, it helps with identifying the best way to reduce risk and to determine the probability of an event occurring. The FTA shares many of the same aspects as the BowTie Analysis (BTA). The model was originally made by H.A. Watson working at Bell Laboratories with the goal of evaluating ballistic missiles. Since then, the FTA has spread to a wide range of industries where identifying risks and calculating probability is relevant.

The Model

The model usually consists of 4 elements:

The main event: The event at the top of the model which shows what is being analyzed within the fault tree.

Intermediate events:Events that occur between the basic events and the main event.

Basic events: A failure or error which results in another event happening. These are shown as circles on the bottom of the model

AND/OR gates: These are the link between the events in the fault tree. AND gates are symbolized with a flat bottom and means that all of the underlying basic events have to happen in order to trigger the intermediate event above. OR gates are symbolized with a curved bottom and means that just one of the underlying basic events have to happen to trigger the intermediate event above.

How can we use this in our projects?

A single fault tree is used to analyze and understand a single event, therefore we need to have conducted a risk analysis of the project before an FTA becomes relevant. Once we have the risk analysis we use the FTA's on each of the hazards we have identified. It basically comes down to the following five steps:

1: Define the undesired event to study

2: Obtain an understanding of the event

3: Construct the fault tree

4: Evaluate the fault tree

5: Control the identified hazards

By following these steps you can reduce the risk within your project and at the same time determine which risks you are already protected towards and which risks you need to put more ressources into.

About the Author

Gustav Landgreeen-Petersen

gl@rocconsult.eu

Other articles:

Risk Identification 
Risk identification is the initial step in risk management. It involves recognizing potential risks within the scope of a project such as the construction of an offshore wind farm. Effective risk management relies on identifying as many risks as possible. At this stage, the focus is not on assessing the impact or likelihood of these …
Risk strategies: Avoidance and Acceptance
Risk management strategies Risk Avoidance and risk Acceptance are two opposite ways to manage risk. Click here to learn more..
Controls to Reduce Risk & Pitfalls to Avoid
Introduction There are numerous controls to avoid and reduce the risks to your project or organization. Though the risk is not always avoidable, there are ways to alter it. Below are proven controls used to alter risk. Controls - Engineering Controls: these are controls that reduce risk using engineering methods. This can include: 1. How …

GET IN TOUCH

Feel free to contact us

for more information

+45 28 60 49 50

contact@rocconsult.eu

JOIN OUR NEWSLETTER

Our core business is rehearsing

excellence in your project


RoC Drill is used by:

RoC Consult ApS - All rights reserved.

We use cookies to allow us to better understand how the site is used. By continuing to use this site, you consent to this policy. Click to learn more