Securing Utility and Energy Infrastructures - Bookswagon UAE
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Industrial chemistry and manufacturing technologies > Industrial chemistry and chemical engineering > Securing Utility and Energy Infrastructures
Securing Utility and Energy Infrastructures

Securing Utility and Energy Infrastructures


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

The latest security measures for utility and energy industries

Addressing the growing post-9/11 concern about the safety of the utility and energy industries, SecuringUtility and Energy Infrastructures presents a detailed blueprint for safeguarding these vital fields. This comprehensive guide discusses how to protect the electric, oil and gas, nuclear, telecommunications, and water industries from a conventional or terrorist attack.

Written for anyone who is charged with the safety of these industries, Securing Utility and Energy Infrastructures explains how to look for and monitor potential physical vulnerabilities at a plant or water facility, what contaminants might be introduced to cause a catastrophic event, and how to integrate and perform vulnerability assessments and emergency response plans. This practical manual also examines the differences between a terrorist attack and a conventional mode of attack and the economic impact of each.

Securing Utility and Energy Infrastructures contains insightful information on:
* The latest security technology and tools available, including biotoxicity monitors and cb detection systems
* Security crisis management planning and security policies, procedures, and guidelines
* Industry-specific security issues and infrastructure security programs
* Current federal, state, and private safety efforts and their costs

Securing Utility and Energy Infrastructures stresses the importance of a proactive rather than a reactive approach to the safety of utility and energy industries. This text is an essential resource for federal and state utility regulators, industrial hygienists, first responders, Hazmat professionals, safety professionals, utility managers, IT professionals, and the criminal justice community at the federal, state, and local level.

Table of Contents:
1. INADEQUATE SECURITY TODAY.

History of the Utility/Energy Industry.

Federal Legislative Issues.

Deregulation of the Utility Industry.

The Role of Federal and State Utility Regulators.

Post 9/11 Information Sources.

Risk Assessment versus Needs Assessment.

2. THE ECONOMIC IMPACT OF A TERRORIST ATTACK.

Utility Industry-Prime Targets for Terrorists.

Major Types of Threats.

Use the Infrastructure as a Weapon Against Us.

Create Power Surges.

Cyber Attack.

Lack of Vital Spare Parts.

Terrorists’ Goals.

Jihadism Began in the 11th Century.

Terrorism in America.

No Stopping Terrorism.

Impact Comparisons versus Other Crises.

Impact on the United States Economy.

Costs of Recovery.

Direct Impacts.

Indirect Impacts.

Insurance.

Airlines.

Defense Spending.

Longer Term Impacts.

3. WHAT IS BEING DONE TO PROTECT THE UTILITY INDUSTRY?.

Federal Responses.

Nuclear Plant Security.

Federal Anti-Cyber-Attack Programs.

State Responses.

New York’s Model Program.

Other State Organizations.

Utility/Energy Industry Response.

Electrical Substations.

Natural Gas Facilities.

Nuclear Utility Security.

How Do We Move Forward?.

Progress at State and Federal Levels.

The Role of Insurance Companies.

Who Pays?.

4. THE POST-9/11 SECURITY ASSESSMENT PROCESS.

New Security Needs.

Physical Security Assessment Process.

Information and Computer Security Assessment Process.

Computer Security.

Biochemical and Anthrax Security Assessment Process.

Pre-employment and Annual Screening.

Due Diligence Screening.

Security Culture Change Training.

5. SECURITY CRISIS MANAGEMENT PLANNING.

How to Increase Safety.

Security Risk Assessment Process.

Materials and Procedures to Have in Advance.

Outside Risks.

Inside Risks.

Crisis Management Planning.

Crisis Management Team.

Call Response Team.

Review of Emergency Preparedness.

Resource Analysis.

Human Resources.

Document Review.

Physical Assets.

Hazard Analysis.

Vulnerability Assessment.

Gap Analysis.

Business Continuity Planning.

Levels of Disaster.

Key Business Continuity Tasks.

Conduct a Business Impact Analysis.

Track Revenue Flow through Business Units.

Create Recovery Teams.

Disaster Recovery Plan, 84.

Summary of Emergency Procedures.

Level 1 Responsibilities.

Business Continuity Coordinator.

Level 2 Responsibilities.

Level 3 Responsibilities.

Security Policies, Procedures- and Guidelines.

Selecting a Disaster Recovery Center.

6. CRIMINAL JUSTICE COMMUNITY ROLES 93.

Communication and Coordination.

The Criminal Justice Community.

Department of Homeland Security.

Federal Agencies.

State Authorities.

Local Police.

Emergency Personnel.

Effects of the Disaster Experience.

Expand Your Security Program.

Guidelines During and After an Incident.

7. SECURITY TECHNOLOGY.

Current Utility Security Technologies.

Windows Security.

Mitigating the Risks.

Improving SCADA System Security.

Anti-Spyware and Anti-Virus Solutions.

Encryption.

Firewalls.

NERC Meets FERC Security Mandates.

Future Technology Requirements.

Ever-Growing Demands.

The Need for More Electricity.

Near-Term Needs.

Better Wireless Security Is Required.

Long-Term Needs.

8. INDUSTRY-SPECIFIC SECURITY ISSUES.

The Biggest Threat.

The Electric Utility Industry.

How the Electric Grid Works.

Faulty Controls.

The Oil and Gas Industry.

DOE Tackles Security for Oil Industry SCADA Networks.

The Nuclear Industry.

The Telecommunications Industry.

The Water Industry.

Security Threats to Water and Wastewater Infrastructure.

9. INFRASTRUCTURE SECURITY PROGRAMS.

Experimental Programs.

Idaho National Engineering and Environmental Laboratory (INEEL).

NERC Standards.

Global Efforts and Coordination.

The World Summit on the Information Society.

An Australian Example.

Monitoring Capabilities.

10. FINANCING THE UTILITY INDUSTRY SECURITY.

Rate Increases.

Government Incentives.

Insurance Company Incentives.

Reselling of Utility Security Services.

Healthcare Industry.

Physical Safeguards.

Technical Security Services.

Technical Security Mechanisms.

Schools and Colleges.

11. ROLE OF NATIONAL AND STATE ASSOCIATIONS.

National Utility Associations.

Edison Electric Institute.

North American Electric Reliability Council.

The Nuclear Energy Institute.

American Gas Association.

Electric Power Research Institute.

United Telecommunications Council.

National Rural Electric Cooperative Association.

The National Rural Utilities Cooperative Finance Corporation.

North American Electric Reliability Council.

American Public Power Association.

State Utility Associations.

National Rural Water Association.

The Institute of Public Utilities.

Professional Security Associations.

Professional Law Enforcement Associations.

12. FUTURE DIRECTIONS IN THE UTILITY/ENERGY INDUSTRY.

Utility-Provided Security Services.

Federal Government.

Commercial and Industrial Accounts.

Colleges and Schools.

Homeowners.

APPENDICES.

Electricity Restructuring, 2003 Blackout Identifies Crisis and.

Opportunity for the Electronic Sector.

Laboratories and Research Facilities.

Small and Medium-Sized Businesses to Take Steps to.

Prepare for Emergencies.

2004 Counterterrorism Grants State Allocations.

Fact Sheet: Department of Homeland Security Appropriations.

Act of 2005.

Fact Sheet: U.S. Department of Homeland Security 2004 Year.

End Review.

First Responder Grants.

Department of Homeland Security Programs and This.

Compliance Supplement.

2006 Budget Request Increases Seven Percent.

Cyberspace Threats and Vulnerabilities.

National Response Plan.

Department of Homeland Security--Who Became Part of the.

Department?.

National Strategy for Homeland Security.

America’s Security Since 9/11.

2005 Basic Catalog of Federal Domestic Assistance.

INDEX.



About the Author :
LARRY NESS, PhD, has been involved in law enforcement and security since 1970. He has authored numerous articles on security and taught courses on law enforcement and security. He is currently president and owner of Ness Group International, a security consulting and investigative group specializing in the utility and energy industries.


Best Sellers


Product Details
  • ISBN-13: 9780470054536
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: Wiley-Interscience
  • Language: English
  • ISBN-10: 0470054530
  • Publisher Date: 05 Jul 2006
  • Binding: Digital (delivered electronically)
  • No of Pages: 360


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Securing Utility and Energy Infrastructures
John Wiley & Sons Inc -
Securing Utility and Energy Infrastructures
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Securing Utility and Energy Infrastructures

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!