1 Wisconsin Wastewater Operators Association Christopher P. Haase, P.E.
2 Introduction Welcome Security Planning and Evaluation Available Funding Sources Q&A
3 Security Planning and Evaluation History Acropolis, Athens Pentagon Washington, D.C.
4 Security Planning and Evaluation Building Safety vs. Building Security Building Safety How a building functions given a predefined event. e.g. Power Outage, Flood, Chemical Spill, etc Building Codes IBC, BOCA, NFPA address minimum building performance requirements Building Security How a building functions in regards to prevention and detection of intentional, humanly motivated threats No prescriptive codes are available
5 Security Planning and Evaluation the BIG question What security measures should be implemented and where should they be used?
6 Security Planning and Evaluation Security Risk Assessment The Risk Assessment is used to develop the DBT, or Design Basis Threat Security Plan Evaluation The Security Plan Evaluation is a checks and balance approach to ensure that the Risk Assessment DBT has appropriately been addressed given the size and type of facility.
7 Security Planning and Evaluation Assessment Methodology FEMA 426; 2003
9 Security Planning and Evaluation Published Risk Assessment Guidelines Security Vulnerability Self-Assessment Tool Association of Metropolitan Sewerage Agencies (AMSA) Guidelines for Physcial Security of Wastewater and Stormwater Utilities, ASCE/AWWA Protecting Your Community s Assets: A Guide for small Wastewater Systems, National Environmental Services Center (NESC) RAM-W; Risk Assessment Methodology for Water Utilities, DOE Sandia National Laboratories
10 Now that the BIG question has been answered. What are my options for Security System designs?
11 Basic Components of Security Detection Deterrence The security system should be able to indentify the presence of a threat e.g. Video Surveillance, Door Position Switch, Motion Detectors The security system s ability to delay the occurrence of threat. e.g. Signage, Fencing, Lighting, Building/Site Configuration Response The ability to respond or intervene to a threat in a timely manner. Directly related to Deterrence e.g. Owners established procedures to intervene
12 Security Component Relationship Intrusion Event Begins Intrusion Event Ends Threat Completion Time System Deterrence Time Device Detection Response Time First Alarm Time Apprehend Adversary Detection Time Alarm Acknowledged Overall System Response Time
13 Standard Security System Design Site Security Perimeter Protection; Video Surveillance, Fences, Lighting, etc Crime Prevention Through Environmental Design, (CPTED) Building Security Building Envelope; Roof, Doors, Windows, Access Controls, Motion Sensors, Glass Break Sensors etc
14 Site Security System Design GARDENER STREET LIFT STATION
15 Site Security/Perimeter Protection Devices Fencing/Intrusion Detection Systems Fence Disturbance Sensors and Beam Type Motion Sensors GARDENER STREET LIFT STATION
16 Site Security/Perimeter Protection Devices Fence Disturbance Sensor Description: Microphonic Sensor that is woven through the fence material. The sensor detects flexing of the coaxial core. Application: For protection of existing fences & structures against climbing, lifting or cutting. The cable is attached by means of special cable ties at 30cm intervals. Advantages: Quick and simple to install, relatively inexpensive, zone lengths up to 350m, immune to EMI & RFI. Possible Causes of Nuisance Alarms: Extreme weather, contact by large animals, badly maintained fences, overgrown vegetation.
17 Site Security/Perimeter Protection Devices Exterior Beam Type Motion Sensor Description: Infrared or Photobeam Motion sensor emitting multiple beams. Application: Can be used to provide secondary levels of protection or to cover gateways & openings etc., Advantages: Low cost, easy to deploy & maintain.. Possible Causes of Nuisance Alarms: Overgrown vegetation, fog, heavy rain/snow, large animals, movement of mounting posts, severe temperature changes.
18 Site Security/Perimeter Protection Devices Facility Gate Controls GARDENER STREET LIFT STATION
19 Site Security/Perimeter Protection Devices Facility Gate Controls Automatic Gate Operator Interface with Building Access Control System Interface with SCADA system to automatically open and close based on facility operation hours
20 Site Security/Protection Devices Site Lighting GARDENER STREET LIFT STATION
21 Site Security/Protection Devices Site Lighting Average Illuminance of 1.0 FC with 12:1 Uniformity Lighting levels should be increased by facilities entrance Some Municipalities may have special local lighting requirements that need to followed
22 Site Security/Protection Devices Video Surveillance Fixed Camera PTZ Camera Digital Recording Transmitting Video Images from Remote Sites
23 Site Security/Protection Devices Design Consideration for Video Surveillance System PTZ vs. Fixed Camera Fixed Lens Selection Varifocus Auto Iris Viewing Angles Color vs. Black/White Camera Mounting Line-of-Site Obstacles
24 Site Security/Protection Devices Video Surveillance A A A GARDENER STREET LIFT STATION B D C
25 Site Security/Protection Devices Video Surveillance System/Riser Diagram
26 Building Security Building Envelope Building Layout Building Detection Systems
27 Building Security/Building Envelope and Layout Building Facsade Openings, Doors, Windows, Overhead Doors Size Location Material Building Construction Methods Location of Assets Building Entrances
28 Building Security/Building Envelope and Layout
29 Building Security/Electrical Systems Security and Access Control Systems (Card Readers) Motion Sensor Glass Break Detectors SCADA
30 Building Security/Sample Building Layout
31 Security System Design Applications Site Fond du Lac Water Pollution Control Plant
32 Security System Design Applications Site Fond du Lac Water Pollution Control Plant Facility Entrance Fencing Video Surveillance Facility Gate Access Control Lighting
33 Security System Design Applications Video Surveillance Fond du Lac Water Pollution Control Plant
34 Security System Design Applications Video Surveillance Fond du Lac Water Pollution Control Plant
35 Available Funding Clean Water Fund Program (Small Loan) Wisconsin CWFP (Small Loan) Dave Calhoon Department of Homeland Security Grant Program Wisconsin - Homeland Security Contact BG Donald Dunbar Homeland Security Advisor PO Box 8111 Madison, WI
36 Summary Security is a constantly evolving issue Security Risk Assessments Review Make Adjustments Implement
Fort Bend Independent School District Safety and Security Master Plan Proposal As of July 22, 2014 INTRODUCTION AND BACKGROUND The Fort Bend Independent School District s Safety and Security Master Plan
Security Guidelines for General Aviation Airports Information Publication A-001 May 2004 Version 1.0 This guidance document was developed by TSA, in cooperation with the General Aviation (GA) community.
Emergency Management Guide for Business and Industry A Step-by-Step Approach to Emergency Planning, Response and Recovery for Companies of All Sizes FEMA 141/October 1993 EMERGENCY MANAGEMENT GUIDE FOR
A specifier s guide to access control systems October 2012 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: email@example.com www.bsia.co.uk
Risk Control Bulletin Water Damage Prevention A Property Protection Imperative Water is one of the most destructive agents when released into a building. Water erodes surfaces; causes rot and deterioration
Example Security Plan Section 1 PURPOSE: This Security Plan constitutes the "Standard Operating Procedures" relating to physical, cyber, and procedural security for all (Utility) hydro projects. It contains
April 21, 2009 Dines Bjørner: MITS: Models of IT Security: 1 Models of IT Security Security Rules & Regulations: An Interpretation Dines Bjørner Fredsvej 11, DK 2840 Holte, Denmark Presented at Humboldt
Barbara B. Balser, National Chair Abraham H. Foxman, National Director 2003, 2005 Anti-Defamation League Printed in the United States of America All rights reserved Web site: www.adl.org Protecting Your
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Post Sandy Enhancement Plan Consolidated Edison Co. of New York Orange and Rockland Utilities June 20, 2013 2 CONTENTS INTRODUCTION... 7 EXECUTIVE SUMMARY... 8 I. FORTIFYING THE STEAM, GAS, AND ELECTRIC
Smart Wireless Solutions for Plant Operations Start anywhere, go everywhere. Take back control......by extending predictive intelligence capabilities to further reduce risk and improve operations. SMART
Smart and Sustainable Homes Design Objectives Regulatory requirements Queensland Department of Public Works June 2008 ISBN 978-0-9804690-2-8 The State of Queensland (Department of Public Works) Cover photography
Total Connect TM 2.0 Online Help Guide Hints for use: When viewing in a web browser, hit F11 to toggle full screen mode. Use the bookmarks panel or table of contents to jump to the desired topic. Select
The Critical Security Controls for Effective Cyber Defense Version 5.0 1 Introduction... 3 CSC 1: Inventory of Authorized and Unauthorized Devices... 8 CSC 2: Inventory of Authorized and Unauthorized Software...
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
Grandstream Networks, Inc. GXV3662 User Manual Safety Instructions These instructions are intended to assist users with the operation of the GXV3662 and also to instruct on how to avoid dangerous situations
Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND
WHITE PAPER FOR PUBLIC TRANSPORT STAKEHOLDERS Based on the lessons learned in SECUR-ED This White Paper benefits from the conclusions of FP7 PROTECTRAIL (www.protectrail.eu) Content 1. Introduction and
READY, SET, GO! Montana YOUR PERSONAL WILDLAND FIRE ACTION GUIDE READY, SET, GO! Montana Wildland Fire Action Guide Saving Lives and Property through Advanced Planning 2 F ire season is now a year-round
VOLUME 1 Optimized for Small and Medium Data Centers Physical infrastructure for a scalable, adaptable, efficient, reliable, predictable data center with 5 to 100 racks 2012 Schneider Electric. All Rights
UNIFIED FACILITIES CRITERIA (UFC) LOW IMPACT DEVELOPMENT APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED UNIFIED FACILITIES CRITERIA (UFC) LOW IMPACT DEVELOPMENT Any copyrighted material included in
Incident Management Index Purpose Description Relevance for Large Scale Events Options Technologies Impacts Integration potential Implementation Best Cases and Examples 1 of 13 Purpose An incident is an
HIPAA Security Risk Analysis Toolkit In January of 2013, the Department of Health and Human Services Office for Civil Rights (OCR) released a final rule implementing a wide range of HIPAA privacy and security
Crime Prevention Through Environmental Design Guidebook 3 VISION Making Singapore Safe & Secure for all. MISSION We work in Partnership with the Community and the Police to prevent crime. National Crime