Securing Utility and Energy Infrastructures
Addressing the growing post-9/11 concern about the safety of the utility and energy industries, SecuringUtility and Energy Infrastructures presents a detailed blueprint for safeguarding these vital fields. This comprehensive guide discusses how to protect the electric, oil and gas, nuclear, telecommunications, and water industries from a conventional or terrorist attack.
Written for anyone who is charged with the safety of these industries, Securing Utility and Energy Infrastructures explains how to look for and monitor potential physical vulnerabilities at a plant or water facility, what contaminants might be introduced to cause a catastrophic event, and how to integrate and perform vulnerability assessments and emergency response plans. This practical manual also examines the differences between a terrorist attack and a conventional mode of attack and the economic impact of each.
Securing Utility and Energy Infrastructures contains insightful information on:
* The latest security technology and tools available, including biotoxicity monitors and cb detection systems
* Security crisis management planning and security policies, procedures, and guidelines
* Industry-specific security issues and infrastructure security programs
* Current federal, state, and private safety efforts and their costs
Securing Utility and Energy Infrastructures stresses the importance of a proactive rather than a reactive approach to the safety of utility and energy industries. This text is an essential resource for federal and state utility regulators, industrial hygienists, first responders, Hazmat professionals, safety professionals, utility managers, IT professionals, and the criminal justice community at the federal, state, and local level.
History of the Utility/Energy Industry.
Federal Legislative Issues.
Deregulation of the Utility Industry.
The Role of Federal and State Utility Regulators.
Post 9/11 Information Sources.
Risk Assessment versus Needs Assessment.
2. THE ECONOMIC IMPACT OF A TERRORIST ATTACK.
Utility Industry-Prime Targets for Terrorists.
Major Types of Threats.
Use the Infrastructure as a Weapon Against Us.
Create Power Surges.
Lack of Vital Spare Parts.
Jihadism Began in the 11th Century.
No Stopping Terrorism.
Impact Comparisons versus Other Crises.
Impact on the
Costs of Recovery.
Longer Term Impacts.
3. WHAT IS BEING DONE TO PROTECT THE UTILITY INDUSTRY?.
Nuclear Plant Security.
Federal Anti-Cyber-Attack Programs.
Other State Organizations.
Utility/Energy Industry Response.
Natural Gas Facilities.
Nuclear Utility Security.
How Do We Move Forward?.
Progress at State and Federal Levels.
The Role of Insurance Companies.
4. THE POST-9/11 SECURITY ASSESSMENT PROCESS.
New Security Needs.
Physical Security Assessment Process.
Information and Computer Security Assessment Process.
Biochemical and Anthrax Security Assessment Process.
Pre-employment and Annual Screening.
Due Diligence Screening.
Security Culture Change Training.
5. SECURITY CRISIS MANAGEMENT PLANNING.
How to Increase Safety.
Security Risk Assessment Process.
Materials and Procedures to Have in Advance.
Crisis Management Planning.
Crisis Management Team.
Call Response Team.
Review of Emergency Preparedness.
Business Continuity Planning.
Levels of Disaster.
Key Business Continuity Tasks.
Conduct a Business Impact Analysis.
Track Revenue Flow through Business Units.
Create Recovery Teams.
Disaster Recovery Plan, 84.
Summary of Emergency Procedures.
Level 1 Responsibilities.
Business Continuity Coordinator.
Level 2 Responsibilities.
Level 3 Responsibilities.
Security Policies, Procedures- and Guidelines.
6. CRIMINAL JUSTICE COMMUNITY ROLES 93.
Communication and Coordination.
The Criminal Justice Community.
Department of Homeland Security.
Effects of the Disaster Experience.
Expand Your Security Program.
Guidelines During and After an Incident.
7. SECURITY TECHNOLOGY.
Current Utility Security Technologies.
Mitigating the Risks.
Improving SCADA System Security.
Anti-Spyware and Anti-Virus Solutions.
NERC Meets FERC Security Mandates.
Future Technology Requirements.
The Need for More Electricity.
Better Wireless Security Is Required.
8. INDUSTRY-SPECIFIC SECURITY ISSUES.
The Biggest Threat.
The Electric Utility Industry.
How the Electric Grid Works.
The Oil and Gas Industry.
DOE Tackles Security for Oil Industry SCADA Networks.
The Nuclear Industry.
The Telecommunications Industry.
The Water Industry.
Security Threats to Water and Wastewater Infrastructure.
9. INFRASTRUCTURE SECURITY PROGRAMS.
Global Efforts and Coordination.
An Australian Example.
10. FINANCING THE UTILITY INDUSTRY SECURITY.
Insurance Company Incentives.
Reselling of Utility Security Services.
Technical Security Services.
Technical Security Mechanisms.
Schools and Colleges.
11. ROLE OF NATIONAL AND STATE ASSOCIATIONS.
National Utility Associations.
Edison Electric Institute.
North American Electric Reliability Council.
The Nuclear Energy Institute.
American Gas Association.
Electric Power Research Institute.
United Telecommunications Council.
National Rural Electric Cooperative Association.
The National Rural Utilities Cooperative Finance Corporation.
North American Electric Reliability Council.
American Public Power Association.
State Utility Associations.
National Rural Water Association.
Professional Security Associations.
Professional Law Enforcement Associations.
12. FUTURE DIRECTIONS IN THE UTILITY/ENERGY INDUSTRY.
Utility-Provided Security Services.
Commercial and Industrial Accounts.
Colleges and Schools.
Electricity Restructuring, 2003 Blackout Identifies Crisis and.
Laboratories and Research Facilities.
Small and Medium-Sized Businesses to Take Steps to.
Prepare for Emergencies.
2004 Counterterrorism Grants State Allocations.
Fact Sheet: Department of Homeland Security Appropriations.
Act of 2005.
First Responder Grants.
Department of Homeland Security Programs and This.
2006 Budget Request Increases Seven Percent.
Cyberspace Threats and Vulnerabilities.
National Response Plan.
Department of Homeland Security--Who Became Part of the.
National Strategy for Homeland Security.
2005 Basic Catalog of Federal Domestic Assistance.
- Examines the differences between a terrorist attack and a conventional mode of attack and the economic impact of each
- Contains insightful information on the latest security technology and tools available, including biotoxicity monitors and cb detection systems
- Discusses security crisis management planning and security policies, procedures, and guidelines
- Incorporates industry-specific security issues and infrastructure security programs
- Explains current federal, state, and private safety efforts and their costs
- Stresses the importance of a proactive rather than a reactive approach to the safety of utility and energy industries