Presentation to: THEAMERICAN WATER WORKS ASSOCIATION OUR RESOURCES / OUR LIFE A STRATEGY FOR FACILITY PROTECTION By: Mark A. Graves, AIA DMJMH+N.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

SSEP PROGRAM DEVELOPMENT
Ethics, Privacy and Information Security
Steps to Prevent School Violence Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates Bradley, IL.
FACILITY SAFETY: Creating a Safe and Secure Environment in the Community Health Center Presented by Steve Wilder, BA, CHSP, STS Sorensen, Wilder & Associates.
Presentation Retail Security Key Holding Mobile Patrols Access Control Systems Manned Security Receptionist CCTV Monitoring.
Copyright 2004 Foreman Architects Engineers School Security From Common Sense to High Tech.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Physical and Environmental Security Chapter 5 Part 1 Pages 427 to 456.
11 ASSESSING THE NEED FOR SECURITY Chapter 1. Chapter 1: Assessing the Need for Security2 ASSESSING THE NEED FOR SECURITY  Security design concepts 
Dr. Bhavani Thuraisingham The University of Texas at Dallas (UTD) June 2011 Physical (Environmental) Security.
Security Controls – What Works
Information Security Principles and Practices
The Need for an Integrated View of Water Quality Modeling and Monitoring Bruce Kiselica USEPA, Region 2 Second Workshop on Advanced Technologies in Real.
Computer Security: Principles and Practice EECS710: Information Security Professor Hossein Saiedian Fall 2014 Chapter 16: Physical and Infrastructure Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Physical and Cyber Attacks1. 2 Inspirational Quote Country in which there are precipitous cliffs with torrents running between, deep natural hollows,
Session 3 – Information Security Policies
Chapter 2 Modern Private Security
Chapter 8: Disaster Management
Process Safety Management
Physical Security SAND No C Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States.
Discovery Planning steps (1)
Module 02: 1 Introduction to Computer Security and Information Assurance Objectives Recognize that physical security and cyber security are related Recognize.
A Secure Frontline September 25, 2003
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Wastewater Infrastructure Security Workshop April 15, 2002 Denver, Colorado.
“ I once stayed at an airport hotel in New Jersey. It was night when I got to my room and I was amazed at the bolts and chains and the amount of security.
National Rural Transit Assistance Program. Learning Objectives Safety Safety Security Security Emergency Preparedness Emergency Preparedness.
Chapter 15 Industrial Security. Loss Specific to Industry  Industrial losses frequently include:  Tools.  Materials.  Supplies.  Products.  Pallets.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Occupational Safety and Health 6 th Edition Lecture Notes By: Dr. David Goetsch.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Information Systems Security Operational Control for Information Security.
Securing Critical Chemical Assets: The Responsible Care ® Security Code Protection of Hazardous Installations from Intentional Adversary Acts European.
Information Systems Security Operations Security Domain #9.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Lecture slides prepared for “Computer Security: Principles and Practice”, 3/e, by William Stallings and Lawrie Brown, Chapter 16 “Physical and Infrastructure.
Note1 (Admi1) Overview of administering security.
Physical (Environmental) Security
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Introduction to Information Security
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
CONTROLLING INFORMATION SYSTEMS
Tom Lenart & John Field CT DEMHS Region 2.  Department of Emergency Services and Public Protection (DESPP)  Commission on Fire Prevention and Control.
IS3220 Information Technology Infrastructure Security
Access Control Jeff Wicklund Computer Security Fall 2013.
10. Security and Physical Protection Basic Concepts
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 13 – Physical and.
Process Safety Management Soft Skills Programme Nexus Alliance Ltd.
Physical Security at Data Center: A survey. Objective of the Survey  1. To identify the current physical security in data centre.  2.To analyse the.
Criminal Justice Intro to Security, Instructor Name Date, Semester Chapter 4: PHYSICAL SECURITY: STRUCTURAL, ELECTRONIC, AND HUMAN PROTECTION SYSTEMS.
Module 5: Designing Physical Security for Network Resources
Module 8 Risk Management. Manager, Customer Services Module 8Slide - 2 Objective The learner will be able to: –Develop an understanding of Security Responsibility.
Information Systems Security
Physical Security Governance Model
Chapter 2 Modern Private Security
Risk management.
and Security Management: ISO 28000
Services Delivery in Emergencies
NETW4005 COMPUTER SECURITY A
INFORMATION SYSTEMS SECURITY and CONTROL
Physical Security.
Managing the IT Function
Part 1 Security Action Plan Template.
Presentation transcript:

Presentation to: THEAMERICAN WATER WORKS ASSOCIATION OUR RESOURCES / OUR LIFE A STRATEGY FOR FACILITY PROTECTION By: Mark A. Graves, AIA DMJMH+N

SECURITY MASTER PLANNING I.Asset Definition II.Threat Definition & Vulnerability Analysis III.Development of Security Measures - Electronic Security - Physical Barriers - Policies and Procedures - Security Personnel IV. Selection of Security Countermeasures V. The Design Process

I.ASSET DEFINITION PROCESS  Interview Stakeholders - Senior Management, Mid Management, & Operations Professionals  Identify Components of Your Operation - Research & Development - Plants & Equipment - Employee Morale

I.ASSET DEFINITION PROCESS -List and Classify Assets * Tangible Assets - Plant and Equipment - Raw Materials - Specialized Personnel * Operating Elements - Production - Maintenance - Administration *Facility Infrastructure - Power - Communications with Outside Resources - Domestic Water Requirements - Cooling and Heating Equipment - Access (Road, River Pathways)

I.ASSET DEFINITION PROCESS -List and Classify Assets (Cont.) *Processing Operations - Computer & Equip. Hardware Central Processing Equip. Data Storage Communications Equip. - Software Operating Software Utilities & Applications Communications - Physical Plant Support (Emergency) Dual Comm. Power Supply UPS Battery Back-Up System Emergency Generators Emergency Drinking Water Emergency Cooling Tower Make-Up Water

I.ASSET DEFINITION PROCESS -List and Classify Assets (Cont.) *Intangible Assets - Information Utility Confidential Info. Complaints Service Data - Utility Image Reputation Staff Morale Hiring Practices

I.ASSET DEFINITION PROCESS -Classify Assets  VITAL– Loss Would be Catastrophic  IMPORTANT – Loss Would Prove Seriously Disruptive  SECONDARY – Loss Would Prove Relatively Insignificant

II.THREAT ASSESSMENT  CRIMINAL  NATURAL  ACCIDENTS

II.THREAT ASSESSMENT PROCESS  CRIMINAL * Possible Crimes - Burglary & Robbery - Larceny & Arson - Assault & Theft - Bribery & Extortion - Terrorism & Sabotage - Vandalism - Drug / Alcohol Abuse * Review Internal Loss Data * Review Internal Crime Data (National & Local)  NATURAL DISASTERS - Floods - Tornadoes - Hurricanes - Blizzards - Earthquakes  ACCIDENTS - Hazardous Materials - Fire - Explosion - Industrial Safety - Negligence Exposure (The Contractor)

II.THREAT ASSESSMENT LIST AND CLASSIFY  PROBABILITY OF OCCURANCE *Probable:Expect Event to Occur *Possible:Circumstances Expected for that Event *Unlikely:Possible But Unlikely  SEVERITY OF OCCURANCE *Devastating:Disastrous Event *Moderate:Survivable *Insignificant:Relatively Inconsequential 

III.SECURITY MASTER PLANNING  Vulnerability Analysis *Develop Analysis Group - Facilitator - Crime Specialist - Resource Specialist (Site Manager) - Computer Systems Specialist - Structural / Architectural Facilities Specialist - Plant Engineering Specialist *Establish Assets and Threats to Specific Facility * Prioritize Results

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Correlate Assets and Threats *Develop Team Analysis - Operational Management - Facility Engineering - Data Processing Management - Administration Issues * Develop Contrived Scenarios

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples: - Site Access:Improper Vehicular Access Travel Lane Capacity Planned Roadway Access Blockade Adjacent Rail-Line Blockage Poor Vehicular & Pedestrian Monitoring Control System Poor General Site Access Control (Passive / Active Monitoring) - Building Envelope: Building Stand-Off Distances Building Envelope Resistance to Blast/Forced Entry Door & Window Resistance to Forced Entry & Ballistics Intrusion

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples: - Building Envelope (Cont.): Visual Exposure of Personnel From Uncontrolled Areas Building Access by Vehicles (Parking, Deliveries, Waiting Areas) - Public / Employee Building Access Control: Perimeter Door Access Control Staff Identification System Visitor Identification / Holding Area Control Employee / Maintenance Personnel Internal Access Control

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples (Cont.): - Power:Commercial Substation Attack Emergency Power Fuel Line Attack Internal Power line Sabotage - HVAC:Chem / Bio Air Born Contaminants Internal Chem / Bio Release Water Contaminant Intro. to HVAC Supply System Power Fluctuations (Brown Out)

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples (Cont.): - HVAC (Cont.):Power Failure (Re-Start Time) Maintenance Sabotage Poor Maintenance Personnel Training Parts Manufacturer Reliability

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples (Cont.): - Domestic Water Supply: Introduction of Contaminants Upstream Line Disruption natural accidental intentional disruption

III.SECURITY MASTER PLANNING  Vulnerability Analysis - Process *Facility Infrastructure Vulnerability Examples (Cont.): - Telephone / Data Lines: Attack or Human Error on External Lines Internal Employee / Maintenance Sabotage - Natural Gas: Attack or Human Error on External Lines Explosive Sabotage

IV.SELECTION OF COUNTERMEASURES Process 1. Define Defensive Strategy - Least Dangerous Events – Most Likely to Occur - Most Dangerous Events – Least Likely to Occur 2. Define Priorities 3. Define Requirements - Regulatory and Legal (National Guidelines) Vital Asset – Probable Devastating Threat. Primary, Secondary, Tertiary Important Asset – Unlikely and Moderate Threat. Primary Assets 4. Select Countermeasures - Electronic (Active) Monitoring and Surveillance - Physical (Passive) Barriers - Policy and Procedure Initiatives - Security Personnel (Staffing and Training)

IV.SELECTION OF COUNTERMEASURES Applications - Electronic  Access Control - Employee and Visitor Access ID Badge Software. (Palm, Retinal, Visual Guard ID Verification, and Proximity Readers) - Vehicle Access Control Software (Vehicle Bar Code, Proximity, Driver ID Readers) - Vehicle Arrest Systems. Sally Port Configuration (Delta Barriers & Gates).  Intrusion Monitoring - Entry and Perimeter Detection (Subsurface, Vibration, Motion, and Infrared Detection) - Perimeter Lighting - Door Position Detection. (Alarmed Release Delay, Electronic Lockdown)  CCTV - Full Operation at Low Light Levels - Pan, Tilt, Zoom Capability - Event Recording  Duress - Emergency Alert Devices

IV.SELECTION OF COUNTERMEASURES Applications – Electronic (Cont.)  Security Communication - Radio Dispatch System - Private Intercom System / LAN - Public Address Group Communication - Telephone / Internet WAN  Life Safety - Fire and Toxic Substance Detection  Process Supervision - Infrastructure Monitoring - Process System Monitoring - Vehicle Access Control Software (Vehicle Bar Code, Proximity, Driver ID Readers) - Vehicle Arrest Systems. Sally Port Configuration (Delta Barriers & Gates).  Computer Security - Virus Detection Programs - File Encryption - System Sweeps - Distributed System Architecture  Screening - Walk Thru Metal Detection - Large Package Inspection - Mail Inspection

IV.SELECTION OF COUNTERMEASURES Applications – Physical Design  Environmental Site Enhancements - Eliminate Straight Drive Aisles at Building (Reduce Vehicle Speed) - Ditch/Berm Grading Mote - Landscape Deterrents - Maximize Building Location Setback (Government Standards)  Building Configuration - Configure Building Elements Remoting Sensitive Areas from Perimeter wall. Elevate as High as Functionally Feasible.  - Fire and Toxic Substance Detection  Process Supervision - Infrastructure Monitoring - Process System Monitoring - Vehicle Access Control Software (Vehicle Bar Code, Proximity, Driver ID Readers) - Vehicle Arrest Systems. Sally Port Configuration (Delta Barriers & Gates).  Building Envelope - Blast Resistant Structural System. Develop to Deter Progressive Collapse - Blast Resistant Skin - Forced Entry, Ballistic Entry, and Blast Resistant Doors - FEBR Windows at First Levels, Ballistic only Above. - Roof Mounted Air Intake

IV.SELECTION OF COUNTERMEASURES App’s – Physical Design (Cont.)  Locking Mechanisms - Electromagnetic Remote Operated Locks - Forced Entry Locks - Carefully Articulated Door Hardware  Internal Compartmentalization - Design Layout to Limit Unnecessary Access to Operation Sensitive Areas  Building Infrastructure Redundancy is Paramount. - Redundancy is Paramount. - Separate Power Feeds from Different Grids - Emergency Power Generation - UPS for Critical Systems - Back-Up Battery System for UPS Assurance - On-Site Storage Tanks for Emergency Conditions (Determine Emergency Duration) Domestic and HVAC Water (and/or Well as Allowed) Diesel Fuel for Generators Fire Water as Required Sanitary Tank

IV.SELECTION OF COUNTERMEASURES App’s – Policy & Procedures  Accounting - Audits for Fraud - Inventory Control  Drug and Alcohol Abuse - Termination Guidelines - Assistance Guidelines  Disaster Avoidance and Recovery - Mitigation Strategy - Delegation of Authority - Implementation - Training Exercises  Facility Access - Access Levels - Credentials  Security Management - Operating Philosophy - Security Plan Updates  Personnel - Background Investigations - Debriefing - Heightened Security Awareness

IV.SELECTION OF COUNTERMEASURES App’s – Security Personnel  Management Philosophy - Legal Requirements vs. Necessary Service  Security Training  Community Relations  Operations - Command Center - Mobile Patrols - Fixed Posts - Investigations  Post Orders  Law Enforcement Liaisons

V.SYSTEM AND FACILITY DESIGN  Design Criteria  Conceptual Design  Preliminary Design  Final Design  Importance of Consensus Throughout the Process

WHY?