Securing Utility and Energy InfrastructuresJohn Wiley & Sons, 5 juil. 2006 - 360 pages The latest security measures for utility and energy industries Addressing the growing post-9/11 concern about the safety of the utility and energy industries, SecuringUtility and Energy Infrastructures presents a detailed blueprint for safeguarding these vital fields. This comprehensive guide discusses how to protect the electric, oil and gas, nuclear, telecommunications, and water industries from a conventional or terrorist attack. Written for anyone who is charged with the safety of these industries, Securing Utility and Energy Infrastructures explains how to look for and monitor potential physical vulnerabilities at a plant or water facility, what contaminants might be introduced to cause a catastrophic event, and how to integrate and perform vulnerability assessments and emergency response plans. This practical manual also examines the differences between a terrorist attack and a conventional mode of attack and the economic impact of each. Securing Utility and Energy Infrastructures contains insightful information on: * The latest security technology and tools available, including biotoxicity monitors and cb detection systems * Security crisis management planning and security policies, procedures, and guidelines * Industry-specific security issues and infrastructure security programs * Current federal, state, and private safety efforts and their costs Securing Utility and Energy Infrastructures stresses the importance of a proactive rather than a reactive approach to the safety of utility and energy industries. This text is an essential resource for federal and state utility regulators, industrial hygienists, first responders, Hazmat professionals, safety professionals, utility managers, IT professionals, and the criminal justice community at the federal, state, and local level. |
Table des matières
1 | |
17 | |
3 WHAT IS BEING DONE TO PROTECT THE UTILITY INDUSTRY? | 39 |
4 THE POST911 SECURITY ASSESSMENT PROCESS | 55 |
5 SECURITY CRISIS MANAGEMENT PLANNING | 73 |
6 CRIMINAL JUSTICE COMMUNITY ROLES | 93 |
7 SECURITY TECHNOLOGY | 109 |
8 INDUSTRYSPECIFIC SECURITY ISSUES | 123 |
12 FUTURE DIRECTIONS IN THE UTILITYENERGY INDUSTRY | 177 |
CHAPTER 1 APPENDIX | 189 |
CHAPTER 3 APPENDIX | 239 |
CHAPTER 4 APPENDIX | 267 |
CHAPTER 5 APPENDIX | 275 |
CHAPTER 6 APPENDIX | 281 |
CHAPTER 7 APPENDIX | 321 |
CHAPTER 10 APPENDIX | 325 |
9 INFRASTRUCTURE SECURITY PROGRAMS | 139 |
10 FINANCING THE UTILITY INDUSTRY SECURITY | 151 |
11 ROLE OF NATIONAL AND STATE ASSOCIATIONS | 163 |
INDEX | 337 |
Autres éditions - Tout afficher
Expressions et termes fréquents
2003 Blackout Identifies 2003 Program transferred Administration application assistance Blackout Identifies Crisis Bob Huber budget business-continuity CBRNE Center CFDA CFDA number chemical communications computer security coordinate costs Crisis and Opportunity critical infrastructure cyber attack cyber security CYBERSPACE Department of Homeland DHS/Emergency Preparedness disaster Domestic Preparedness electric grid Electricity Sector Appendix Emergency Management Emergency Management Agency employees energy enhance equipment facilities Federal Emergency Management FERC funds FY 2003 Program Homeland Security Homeland Security Grant identify implementation improve incident increase issues jurisdictional assessment law enforcement levels markets million monitoring nation’s National National Response Plan NERC nuclear operations percent personnel plans potential Preparedness and Response protect Regulatory reliability risk SCADA SCADA systems SCBA Security Grant Program strategy substations terrorism terrorist attack threat transmission Urban Area US-VISIT utility/energy companies utility/energy industry vulnerabilities
Fréquemment cités
Page 297 - Investigation (FBI) defines terrorism as the unlawful use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or any segment thereof, in furtherance of political or social objectives...
Page 66 - A Summary of Your Rights under the Fair Credit Reporting Act The federal Fair Credit Reporting Act (FCRA) is designed to promote accuracy, fairness, and privacy of information in the files of every "consumer reporting agency" (CRA). Most CRAs are credit bureaus that gather and sell information about you — such as if you pay your bills on time or have filed bankruptcy — to creditors, employers, landlords, and other businesses. You can find the complete text of the FCRA, 15 USC 1681-1681u, at the...
Page 67 - Access to your file is limited. A CRA may provide information about you only to people with a need recognized by the FCRA - usually to consider an application with a creditor, insurer, employer, landlord, or other business. • Your consent is required for reports that are provided to employers, or reports that contain medical information. A CRA may not give out information about you to your employer, or prospective employer, without your written consent. A CRA may not report medical information...
Page 67 - CRA must give you a written notice telling you it has reinserted the item. The notice must include the name, address and phone number of the information source. » You can dispute inaccurate items with the source of the information. If you tell anyone -- such as a creditor who reports to a CRA - that you dispute an item, they may not then report the information to a CRA without including a notice of your dispute. In addition, once you've notified the source of the error in writing, it may not continue...
Page 68 - Federal Reserve System member banks (except national banks, and federal branches/agencies of foreign banks) Federal Reserve Board Division of Consumer & Community Affairs Washington, DC 20551 202-452-3693 Savings associations and federally chartered savings banks (word "Federal...
Page 275 - Plan establishes a comprehensive all-hazards approach to enhance the ability of the United States to manage domestic incidents...