Analyzing Cascading Effects within Infrastructure Sectors for Consequence Reduction
|
|
|
- Allan Beasley
- 9 years ago
- Views:
Transcription
1 Analyzing Cascading Effects within Infrastructure Sectors for Consequence Reduction Rae Zimmerman, Professor of Planning and Public Administration and Director, Institute for Civil Infrastructure Systems, Wagner Graduate School of Public Service, New York University, 295 Lafayette Street 2 nd floor, New York, NY 10012, (212) , [email protected] Carlos E. Restrepo, Research Assistant Professor, Institute for Civil Infrastructure Systems, Wagner Graduate School of Public Service, New York University, 295 Lafayette Street 2 nd floor, New York, NY 10012, New York, NY 10012, (212) , [email protected] Proceedings of the 2009 IEEE International Conference on Technologies for Homeland Security, HST 2009, Waltham, MA. Abstract Cascading effects of infrastructure failures from terrorist attacks or natural hazards can greatly increase the magnitude of impacts from a failure of any given infrastructure. Interdependencies among infrastructure sectors in part drive these effects. Capturing how interdependencies operate and heighten impacts to develop procedures and policies to improve recovery is less well understood. This paper first presents an accounting system to identify where interdependencies are likely to occur. Second, given interdependencies, ways to portray vulnerabilities from interdependencies and estimate magnitude with qualitative or integer scales are presented from prior research and event databases. The methodology to quantify interdependencies and associated cascades builds on work on electric power outages and impacts they had on other infrastructure, such as oil and natural gas, electricity, transportation, and water. The method can be used to analyze connections between restoration times and types of interconnections failed and alternative technologies to reduce impacts of cascades. 1. INTRODUCTION What is Critical Infrastructure? The concept of critical infrastructure has arisen most recently in connection with security primarily from terrorist attacks, though the concept has since broadened to include other kinds of threats. Since the mid-1990s, when an initial attack on the World Trade Center (WTC) occurred in 1993 followed by the World Trade Center (WTC) attacks of September 11, 2001, the U.S. has developed legislation and programs to protect key infrastructure [1, updated]. Prior to the WTC attacks in 2001, federal initiatives included the 1996 Executive Order 13010, and a special infrastructure protection commission and office, and in 1998, the Presidential Decision Directive (PDD) 63. In 2001, the USA Patriot Act s Section 1016 defines critical infrastructure as systems and assets, whether physical or virtual, so vital to the nation that the incapacity or destruction of such systems would have a debilitating impact on security, national economic security, [or] national public health and safety. Following the Patriot Act, almost annually, critical infrastructure protection (CIP) was featured in various strategies and plans gradually becoming more specific to infrastructure and the individual categories within them. In 2009, the National Infrastructure Protection Plan (NIPP) first produced in 2005, was updated. The coverage of CIP has expanded from terrorist related security to an all-hazards approach, underscored by the devastating impacts on human populations related in part to the failure of critical infrastructures following Hurricane Katrina in What are Interdependencies and Dependencies? Rinaldi, Peerenboom and Kelly [2] and others [3] differentiate between interdependencies and dependencies in infrastructure systems and provide a typology for interdependencies including spatial and functional distinctions. Spatial Interdependencies: One infrastructure can be located near another infrastructure for economic reasons, so a physical failure in one leads to damage of and a failure in another nearby facility. Functional Interdependencies: Two infrastructures depend on one another to function. For example, information technology requires electricity to function, and electricity requires information technology to manage control systems, so they are mutually interdependent to support each others functions. To some extent the interdependency concept has been integrated into security policy and plans. For example, the NIPP mentions the concept. The Sector Specific Plans developed in connection with the 2005 version of NIPP vary in the extent to which they explicitly identify and emphasize interdependencies. The next section gives examples of interdependencies that provide the foundation for an accounting system.
2 2. AN ACCOUNTING SYSTEM FOR INFRASTRUCTURE INTERDEPENDENCIES In order to develop an accounting system to portray interdependencies, two steps are necessary. First, where interdependencies are likely to occur is needed as a basis for organizing and quantifying the relationships. Second, given the location of these interdependencies, the estimated magnitude can then be ranked on a qualitative or integer scale based on experiences and event databases over time. Criteria for ranking can, for example, be based on the frequency with which the interdependencies occur or the seriousness should failures occur as a result of the interdependencies. Table 1 presents an overview of some generic interdependencies among key infrastructure sectors: oil and natural gas, electricity, transportation, and water. Information technologies (communication and computing) are included, which have been growing in use, are highly diverse and their use in detection, communication and control systems for other infrastructure is growing. Tables 2 through 5 provide more detail on communication technologies and their relationship to each of the other four infrastructure sectors. Once interdependencies are identified, independent of their vulnerabilities (these vulnerabilities are discussed in section 3 below), significance and importance scores can be assigned based on prevailing knowledge of the extent and severity of the interdependencies. Sector Generating the Service to Another (Receiving) Sector Energy: Oil & Gas Energy: Electricity Transportation Water Communication Table 1 Overview of Generic Interdependencies among Infrastructure Sectors Sector Receiving the Service Energy: Energy: Electricity Transportation Water Communication Oil & Gas Electricity for extraction and transport (pumps, generators) Delivery of supplies and workers Production water Breakage and leak detection and remote control of operations Fuel to operate power plant motors and generators Delivery of supplies and workers Cooling and production water Detection and maintenance of operations and electric transmission Fuel to operate transport vehicles Power for overhead transit lines Water for vehicular operation; cleaning Identification and location of disabled vehicles, rails and roads; the provision of user service information Fuel to operate pumps and treatment Electric power to operate pumps and treatment Delivery of supplies and workers Detection and control of water supply and quality Fuel to maintain temperatures for equipment; fuel for backup power Energy to run cell towers and other transmission equipment Delivery of supplies and workers Water for equipment and cleaning Table 2. Example of Accounting for Interdependencies: Information Technology and Oil and Natural Gas Monitor production, flow, pressure and other pipeline properties for safety and efficiency of operations Identify environmental conditions and intrusions Electronically shut remote or not easily accessible facilities in emergencies Manage remote operation locations from more accessible places
3 Table 3. Example of Accounting for Interdependencies: Information Technology and Electricity Shut down equipment in emergencies to avoid equipment damage Reroute electricity in response to supply and demand Identify electricity usage and flow rates Identify anomalies or upsets in the system to prevent them from spreading Promote smart grid infrastructure: A "Smart Grid is a transformed electricity transmission and distribution network or "grid" that uses robust two-way communications, advanced sensors, and distributed computers to improve the efficiency, reliability and safety of power delivery and use. [4] Table 4. Example of Accounting for Interdependencies: Information Technology and Transportation Identify the location of disabled vehicles Match the volume of traffic to the provision of transit vehicles Improve vehicular flow through signaling efficiency Detect intrusions into water systems and contamination incidents to enable managers to initiate warnings and adjust system operations Detect leakages in water distribution systems as a basis for taking steps to reduce wasting water Cover a large variety of contaminants in water using increasingly specialized devices for water quality detection Table 5. Example of Accounting for Interdependencies: Information Technology and Water and Wastewater Manage the increasing number and stringency of water contaminants to safeguard water quality Identify contaminant incidents and reduce sources of contamination Identify where deficits exist in water supply as a basis for water conservation Detect terrorist activity and intrusions into water infrastructure with sensors that can detect chemical and biological agents and radioactivity used as weapons 3. QUANTIFYING VULNERABILITIES FROM INTERDEPENDENCIES The Dilemma of Cascades Cascading effects of infrastructure failures from terrorist attacks or natural hazards can greatly increase the magnitude of the impacts of a failure of any given infrastructure. These effects are driven by interdependencies among infrastructure sectors. How to capture the way in which these interdependencies operate and heighten impacts and how this knowledge can be used as the basis to improve recovery is less well understood. The sections below first identify measurements for interdependencies, where interdependencies have been occurring and reflect vulnerability and how one begins to organize this information into an accounting system. Prior Research To take the accounting system to the next step, the paper also presents methodologies to quantify functional and spatial interdependencies and associated cascades. Functional interdependency measures build upon work conducted for electric power outages and the impacts they had on other infrastructure, such as water, wastewater, and transportation [5], and other sources are cited as well. The quantification of spatial interdependencies is illustrated with generic types of influences infrastructures have on one another when they fail. The measure formulated by Zimmerman and Restrepo [5] for functional interdependency used a numerical ratio of the time it took for a given infrastructure to be restored relative to the time it took electric power servicing that infrastructure to be restored. The findings in connection with the August 2003 electric power outage are summarized below, and the paper covers other kinds of outages as well. Initial Computer Failures Considered a Contributing Cause (Total Power Outage Duration = hours) NOTE: T(e) is the electric power outage duration and T(i) is the affected infrastructure outage duration T(i)/T(e) Transit-electrified rail (NYC) 1.3 Traffic Signals (NYC) 2.6 Water Supply (Cleveland, OH) 2.0 Water Supply (Detroit, MI) 3.0 The application of some of the impacts or cascades measured in the Zimmerman and Restrepo [5] work can be expanded to oil refinery and oil pipeline outages after the Gulf Coast hurricanes. For example, some of the refineries took anywhere from the same time to eight times the
4 duration for power to be restored. Given that restoration time can be a function of a variety of factors (including mandatory and deliberate shutdowns), research needs to go further in using the method as a screen to analyze more deeply the connections between restoration times and where and what type of interconnections did in fact fail. For instance, some infrastructure such as water supply systems have expanded in a way that has increased the use of pumps hence increasing the dependency on electric power. Other approaches to functional interdependencies have been developed. For example, Haimes et al. [7] have conceptualized and quantified interdependencies in the form of input-output matrices as well as for individual facilities. Apostalakis and Lemon [8] have relied on a detailed understanding of infrastructure networks using userinfrastructure combinations for natural gas, water and electricity. A different approach applied a ratio technique to spatial interdependencies primarily among infrastructure distribution systems using a constructed dataset of actual events that yielded the following results ranked in order of which infrastructure initiated the greatest effect on all others [6]: Ratio of the Number of Times a Given Infrastructure Caused a Disruption in Another Infrastructure vs. Another Infrastructure Disrupting It Water mains 3.4 Roads 1.4 Sewers/ sewage treatment 1.3 Electric Lines 0.9 Gas lines 0.5 Fiber Optic/Telephone 0.5 Examples of Cascading Effects from Infrastructure Interdependencies in Catastrophic Events Interdependencies comprise a highly significant dimension for understanding system vulnerability and potential impacts to users. Interdependencies are now becoming critical vulnerabilities in infrastructure services. Some examples of vulnerabilities where systems were actually brought down or alternatively, damage was prevented specifically from interdependencies are instructive and are an important foundation for accounting for interdependencies and focusing on those that are critical. Given that information technology is a growing area of interconnection and control for many infrastructures, examples are drawn from that area. IT and Transit On August 20, 2003, the entire CSX rail system shut down in 23 states, since a computer system monitoring train movement and signals failed; system restoration relied initially on manual overrides, such as faxing train orders [9]. On May 25, 2006, 112 Amtrak trains and 45 NJ Transit trains were disrupted when a 4 year old computer part failed to relay an order to restore power at one of six Amtrak substations after an electricity reduction for maintenance. Amtrak managed the situation by having substations manned in peak hours, not reducing power capacity for maintenance, and having spare locomotives to move stalled trains. [10] In August 2006, 4,000 people were evacuated and a couple of dozen people and a number of firefighters were injured in a subway fire, largely attributed to delayed communications. Subway operators could not reach radio dispatchers for 5 minutes and radio dispatchers were delayed 13 minutes in getting messages to emergency rescue workers due to the lack of a dedicated radio frequency. [11] In the London train bombings of 2005, CCTV enabled the authorities to initially track the perpetrators and finally apprehend them, though it couldn t avoid the attack [12]. In New York City, September 11, 2001, communications averted deaths by allowing train operators time to prevent trains from entering the area -Within a minute of the first plane hitting the north tower, a train operator alerted the control center of the Metropolitan Transportation Authority (MTA) of an explosion, and emergency procedures began. -Within six minutes Port Authority Trans-Hudson (PATH) began emergency procedures. [13] In Bhopal, India in December 1984, communication warnings may also have enabled trains to be used to move people out of the area and prevent trains from entering Bhopal at the time of the release of methyl isocyanate, thus, preventing many more deaths [14]. Energy: Oil and Gas Pipelines Olympic s Bellingham Pipeline failure occurred in June 1999 after an overloaded Supervisory Control and Data Acquisition (SCADA) system prevented operators from detecting a pipeline problem, resulting in a spill of 277,000 gallons of gasoline [15]. In 1999, a hacker was able to disable a pipeline operated by Gazprom in Russia, though the company denied that had occurred [16]. A dozen or more oil and gas pipeline failures were reported during the 1990s due to deficiencies in information system displays, such as SCADA systems and lack of adequate worker training to understand the displays. Improvements were made in information visualization [17]. Energy: Electricity In the August 2003 Blackout, First Energy control room operators were unaware visually and audibly that an alarm had gone off, since their computer
5 system was impaired. This delayed their ability to detect that something was wrong with the electrical system. Subsequently, computer control servers became disabled. [18, p. 51] In the 2003 Blackout, Network congestion caused by the Blaster worm reportedly delayed the exchange of critical power grid control data across the public telecommunications network, which could have hampered the operators ability to prevent the cascading effect of the blackout. [19] A false oil flow alarm shut an electricity transmission line down, causing a widespread blackout in Southern California affecting 500,000 people [20]. In 2009, the penetration of electric power grids by cyberspies was reported that left software that had the potential to destroy electric power infrastructure [21]. In January 2003, the Slammer worm infected the safety monitoring system at the Davis-Besse nuclear power plant in Oak Harbor, Ohio, and replicated so fast that it disabled the system for nearly five hours. The worm knocked out the plant's central command system for six hours. A report from the North American Electric Reliability Council found that power wasn't disrupted, but the failure stopped commands to other power utilities. [22] Water/Wastewater A laptop used to measure water tank levels in a water treatment plant was compromised, pointing to a potential threat, though the water treatment plant was not considered the target [23]. Maroochy Shire sewage spill - In the spring of 2000, a former employee of an Australian software manufacturing organization applied for a job with the local government, but was rejected. Over a 2-month period, this individual reportedly used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for particular sewerage pumping stations and caused malfunctions in their operations, ultimately releasing about 264,000 gallons of raw sewage into nearby rivers and parks. [24] Incorporating Interdependency Vulnerabilities into an Accounting System The accounting framework shown in Table 1 and detailed in Tables 2-5 using information technology as examples in Section 2, contained interdependencies that were neutral with respect to vulnerability. The case-based or event-based information in Section 3 as well as the quantitative indices described in the prior research section and other sources on infrastructure outages are the kind of information that can provide the foundation for applying a system of ranks or scores to those events. 4. CONCLUSIONS AND OBSERVATIONS Interdependencies have become a growing phenomenon across infrastructure sectors as they are not only a point of potential vulnerability but may also compound existing vulnerabilities and carry these vulnerabilities across multiple infrastructure sectors. Given their extensive use, communication technologies present particularly critical interdependencies with other infrastructures. The interdependencies between the communications sector and other infrastructure systems will increase in the near future as society continues to rely on information technology and communications to operate and manage critical infrastructure components. A number of examples included in this paper highlight how vulnerabilities in information technology can lead to various infrastructure failures. These failures can be initiated accidentally, as when a network component fails or in the case of human error, or intentionally, as in the case of attacks by hackers or terrorist groups. Accounting systems that identify key interdependencies and begin to assess and quantify the extent of their vulnerability provide a new dimension to analyzing infrastructure vulnerabilities and constitute an exciting area of risk assessment and risk management research. ACKNOWLEDGEMENTS AND DISCLAIMER This work is presented on behalf of support from the New York University Polytechnic Institute of New York University seed grant funding for the research topic, Critical Infrastructure Policy and Information Security within the seed grant entitled CRISPP: Center for Interdisciplinary Studies in Security and Privacy. This research was also supported by the United States Department of Homeland Security through the Center for Catastrophe Preparedness and Response at New York University, Grant number 2004-GTTX-0001, for the project Public Infrastructure Support for Protective Emergency Services, by the United States Department of Homeland Security through the Center for Risk and Economic Analysis of Terrorism Events (CREATE), Grant number 2007-ST , and the Institute for Information Infrastructure Protection (The I3P) under Award 2003-TK- TX However, any opinions, findings, and conclusions or recommendations in this document are those of the authors and do not necessarily reflect views of the United States Department of Homeland Security. REFERENCES [1] Rae Zimmerman, Critical Infrastructure and Interdependency, Chapter 35 in The McGraw-Hill Homeland Security Handbook, edited by David G. Kamien, New York, NY: The McGraw-Hill Companies, Inc., , 2006.
6 [2] Stephen M. Rinaldi, James P. Peerenboom and Terence K, Kelly, Identifying, understanding and analyzing critical infrastructure dependencies, IEEE Control Systems Magazine, 11-25, December [3] Rae Zimmerman, Social Implications of Infrastructure Network Interactions, in Sustaining Urban Networks: The Social Diffusion of Large Technical Systems, edited by Olivier Coutard, Richard Hanley, and Rae Zimmerman. London, UK: Routledge, 67-85, [4] Wikipedia, Smart Grid, April 20, [5] Rae Zimmerman and Carlos E. Restrepo, The Next Step: Quantifying Infrastructure Interdependencies to Improve Security, International Journal of Critical Infrastructures, 2 (Nos. 2/3), , [6] Rae Zimmerman, Decision-making and the Vulnerability of Critical Infrastructure, Proceedings of IEEE International Conference on Systems, Man and Cybernetics, edited by W. Thissen, P. Wieringa, M. Pantic, and M. Ludema, The Hague, The Netherlands: Delft University of Technology, [7] Yacov Y. Haimes, Barry M. Horowitz, James H. Lambert, Joost R. Santos, Chenyang Lian, and Kenneth G. Crowther, Inoperability Input-Output Model for Interdependent Infrastructure Sectors. I: Theory and Methodology, Journal of Infrastructure Systems, 11 (2), 67-79, June [8] George E. Apostolakis and Douglas M. Lemon, A Screening Methodology for the Identification and Ranking of Infrastructure Vulnerabilities Due to Terrorism, Risk Analysis, 25 (2) , [9] Chip Jones, Computer Virus Blamed in Temporary Shutdown of CSX Rail System, Richmond Times-Dispatch, Va. Knight Ridder/Tribune Business News, August , [10] Associated Press, Amtrak Blames Outage on Computer Flaw, The New York Times, February 23, Outage.html. [11] WABC, Blistering report on summer subway fire, Eyewitness News, January 17, [12] BBC News, Suicide bomb' CCTV shown to jury. January 16, 2007, [13] Allan J. DeBlasio, Terrance.J. Regan, Margaret E. Zirker, F. Brian Day, Michelle Crowder, Kathleen Bagdonas, Robert Brodesky, and Dan Morin, Effects of Catastrophic Events on Transportation System Management and Operations, New York City September 11, Draft, Prepared by the Volpe National Transportation Systems Center for the U.S. Department of Transportation. Washington, D.C.: Federal Highway Administration, ITS Joint Program Office, April [14] Faisal Mohammad Ali, Forgotten hero of Bhopal's tragedy, BBC, December 2, [15] Scott Sunde, National alert from pipeline accident. Regulators urge review of computer systems, Seattle Post- Intelligencer Report, July 9, [16] Dorothy E. Denning, Cyberterrorism, Global Dialogue, Autumn, [17] National Transportation Safety Board. Supervisory Control and Safety Acquisition (SCADA) in Liquid Pipelines. Safety Study. Washington, DC: NTSB, [18] U.S.-Canada Power System Outage Task Force, Final Report on the August 14th 2003 Blackout in the United States and Canada: Causes and Recommendations, The Task Force, April [19] Dan Verton, Blaster Worm Linked to Severity of Blackout, Computerworld, August 29, 2003, [ 10,00.html. [20] Alex Veiga, Sensor Glitch Caused Calif. Power Shutdown, Associated Press, August 26, html. [21] Siobhan Gorman, Electricity Grid in U.S. Penetrated by Spies, The Wall Street Journal, April 8, [22] Michael Arnone, SCADA on thin ice -Industrial control systems pose little-noticed security threat, May 8, [23] Robert McMillan, IDG News Service, October 31, [24] U.S. Government Accountability Office (GAO), Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain, Statement of Gregory C. Wilshusen Director, Information Security Issues, Washington, DC: U.S. GAO, October 17, 2007.
7
The Importance of Information Technology (IT) for Transportation Security
The Importance of Information Technology (IT) for Transportation Security John C. Falcocchio and Rae Zimmerman WISSP10, Abu Dhabi, October 4, 2010 This presentation is for use at WISSP10, and not for further
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
The Geospatial Dimensions of Critical Infrastructure and Emergency Response. White Paper Series. No. 1 - Infrastructure Interdependencies
The Geospatial Dimensions of Critical Infrastructure and Emergency Response White Paper Series No. 1 - Infrastructure Interdependencies Infrastructure Interdependencies 1 November 2008 INTRODUCTION In
Infrastructure Interdependencies
Infrastructure Interdependencies Terrence K. (Terry) Kelly, Ph.D. Senior National Security Officer White House Office of Science and Technology Policy based in part on an article to appear in IEEE Control
Water Infrastructure Interdependencies
Water Infrastructure Interdependencies John Whitler US EPA Office of Water Water Security Division February 12, 2006 November 2005 DRAFT For Official Use Only Do Not Cite, Circulate, or Copy 1 Overview
Critical Infrastructure Security and Resilience
U.S. Department of Homeland Security in partnership with the National Coordination Office for Space-Based Positioning, Navigation and Timing Critical Infrastructure Security and Resilience International
TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING
TELECOMMUNICATION SYSTEM HAZARD MITIGATION STRATEGIC PLANNING A.K. Tang 1 1 President, L&T Engineering and Project Management Consultant, Mississauga. Canada Email: [email protected] ABSTRACT: Telecommunication
CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE
1 CRITICAL INFRASTRUCTURE PROTECTION BUILDING ORGANIZATIONAL RESILIENCE Gavin McLintock P.Eng. CISSP PCIP 2 METCALFE POWER STATION 16 April 2013 Sophisticated physical attack 27 Days outage $15.4 million
Establishing A Secure & Resilient Water Sector. Overview. Legislative Drivers
Establishing A Secure & Resilient Water Sector December 14-15, 2010 LWQTC Overview Key Drivers Legislation Presidential Directives AWWA & Sector Initiatives Standards & Guidance Mutual Aid & Assistance
How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System
Network Security in Power Systems Maja Knezev and Zarko Djekic Introduction Protection control Outline EMS, SCADA, RTU, PLC Attacks using power system Vulnerabilities Solution Conclusion Introduction Generator
MAJOR PLANNING CONSIDERATIONS CHECKLIST
MAJOR PLANNING CONSIDERATIONS CHECKLIST The following checklist is provided as a guide to assure that relevant considerations are identified in the emergency management planning process. Use the blank
City of Buffalo Municipal Electric Utility Energy Emergency Response
City of Buffalo Municipal Electric Utility Energy Emergency Response Table of Contents Page 1. Goals 2 2. Types of Energy Emergencies..3 3. Utility Emergency Operating Plans.4 4. Link to General Reliability/Outage
Vulnerabilities in SCADA and Critical Infrastructure Systems
International Journal of Future Generation Communication and Networking 99 Vulnerabilities in SCADA and Critical Infrastructure Systems Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
BRYN MAWR COLLEGE EMERGENCY RESPONSE PLAN Revised 3/17/08 (abridged)
BRYN MAWR COLLEGE EMERGENCY RESPONSE PLAN Revised 3/17/08 (abridged) This document is a synopsis of the planning and preparation the College has undertaken to handle emergencies in a professional, efficient,
IP Sensing Water & Wastewater AMR/SCADA System
IP Sensing is Pleased To Be Presenting The: IP Sensing Water & Wastewater AMR/SCADA System 12/09/11 Key Markets Addressed by IP Sensing Products Are: Remote Monitoring AMR/SCADA for Water and Wastewater
Verizon, 911 Service and the June 29, 2012, Derecho
Verizon, 911 Service and the June 29, 2012, Derecho August 13, 2012 Verizon, 911 Service, and the June 29, 2012 Derecho Late in the evening of Friday June 29, 2012, a severe storm hit the Mid-Atlantic
Jefferson Parish Department of Water Emergency Plan
1. Overview Jefferson Parish Department of Water Emergency Plan 1.1. Purpose The purpose of this document is to establish procedures for the Department of Water during natural disasters or terrorist acts.
Common Threats and Vulnerabilities of Critical Infrastructures
International Journal of Control and Automation 17 Common Threats and Vulnerabilities of Critical Infrastructures Rosslin John Robles 1, Min-kyu Choi 1, Eun-suk Cho 1, Seok-soo Kim 1, Gil-cheol Park 1,
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Safety and security are simply good business.
THE BUSINESS ASE FOR YBER SEURITY What s this about in a nutshell? The importance of cyber security for manufacturing and computer control systems has only recently been recognized and therefore has not
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
Critical Infrastructure
Critical Infrastructure Long-term Trends and Drivers and Their Implications for Emergency Management June 2011 Overview The state and nature of infrastructure is likely to change over the next several
September 4, 2003. appearing before you today. I am here to testify about issues and challenges in providing for
Testimony of John A. McCarthy, Director of the Critical Infrastructure Protection Project, George Mason School of Law Before a joint hearing of the House Subcommittee on Infrastructure Security and The
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
Oil and Gas Industry A Comprehensive Security Risk Management Approach. www.riskwatch.com
Oil and Gas Industry A Comprehensive Security Risk Management Approach www.riskwatch.com Introduction This white paper explores the key security challenges facing the oil and gas industry and suggests
The Joint Commission Approach to Evaluation of Emergency Management New Standards
The Joint Commission Approach to Evaluation of Emergency Management New Standards (Effective January 1, 2008) EC. 4.11 through EC. 4.18 Revised EC. 4.20 Emergency Management Drill Standard Lewis Soloff
Technology That Delivers Reliable Communications When Disaster Strikes
Technology That Delivers Reliable Communications When Disaster Strikes white paper white paper Technology That Delivers Reliable Communications When Disaster Strikes 2 Introduction By 2010, it is estimated
INCIDENT RESPONSE MANAGEMENT PLAN DECEMBER 2015
INCIDENT RESPONSE MANAGEMENT PLAN DECEMBER 2015 DOCUMENT CONTROL Document Controller: Resilience Coordinator Date of last update: December 2015 Date of next update: December 2016 HPRM reference: HW2007-900/27/9.009
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems. ABB Group October 29, 2009 Slide 1
Claes Rytoft, ABB, 2009-10-27 Security in Power Systems October 29, 2009 Slide 1 A global leader in power and automation technologies Leading market positions in main businesses 120,000 employees in about
Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro
Lessons Learned from a Basic Vulnerability Assessment and Emergency Response Plan Update Project in Greensboro Steve Drew, Director, Greensboro Water Resources Department Jack Moyer, Carolinas / Tennessee
APPENDIX G-Emergency Response Plan Template
APPENDIX G-Emergency Response Plan Template BSDW-ERP Template 10/04 EMERGENCY RESPONSE PLAN WATER SECTOR Public Water System Name: PWSID No: Physical Address: City: State: Zip Code: General Phone Number:
FACILITY AND VENUE PROTECTION
FACILITY AND VENUE PROTECTION INTRODUCTION In late 2001, the Department of Homeland Security was created to develop and coordinate the implementation of a comprehensive national strategy to secure the
Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC
Water Security Issues: The Federal Perspective J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC Outline The Overall Concept for Water Security What s Important in
Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach. www.thalesgroup.com/security-services
Oil & Gas Industry Towards Global Security A Holistic Security Risk Management Approach www.thalesgroup.com/security-services Oil & Gas Industry Towards Global Security This white paper discusses current
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
ESF 12: Energy & Utilities
Table of Contents 1.0 Introduction... 1 1.1 Purpose... 1 1.2 Scope... 1 1.3 ESF Activation & Plan Maintenance... 2 1.4 Policies... 2 2.0 Situation & Assumptions... 2 2.1 Situation... 2 2.2 Assumptions...
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia
Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia Marshall D. Abrams, The MITRE Corporation Joe Weiss, Applied Control Solutions, LLC Annual Computer Security
Prepared by Rod Davis, ABCP, MCSA November, 2011
Prepared by Rod Davis, ABCP, MCSA November, 2011 Disaster an event, which causes the loss of an essential service, or part of it, for a length of time which imperils mission achievement. (Andrew Hiles,
Hospital Emergency Operations Plan
Hospital Emergency Operations Plan I-1 Emergency Management Plan I PURPOSE The mission of University Hospital of Brooklyn (UHB) is to improve the health of the people of Kings County by providing cost-effective,
Table of Contents ESF-3-1 034-00-13
Table of Contents Primary Coordinating Agency... 2 Local Supporting Agencies... 2 State, Regional, and Federal Agencies and Organizations... 3 Purpose... 3 Situations and Assumptions... 4 Direction and
DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES
APPENDIX 1 DISASTER RECOVERY PLANNING FOR CITY COMPUTER FACILITIES March 2008 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS EXECUTIVE SUMMARY...1
How To Handle An Emergency
Company Name Address Telephone Contact Name Title Last Revision Date Policy and Organizational Statements Identify the goals and objectives for the emergency response plan. Define what your emergency response
Preparedness in the Southwest
Preparedness in the Southwest Risk Assessment and Hazard Vulnerability Developed by The Arizona Center for Public Health Preparedness Cover Art www.azcphp.publichealth.arizona.edu Chapter 1 Importance
Emergency Operations Plan ANNEX K - UTILITIES RESTORATION ESF #3, #12 I. MNWALK REQUIREMENTS. Item #: 1, 4, 46, 53, 54
ANNEX K - UTILITIES RESTORATION ESF #3, #12 I. MNWALK REQUIREMENTS Item #: 1, 4, 46, 53, 54 II. PURPOSE The purpose of this annex is to describe the organization, operational concepts and responsibilities
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID
SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID ZBIGNIEW KALBARCZYK EMAIL: [email protected] UNIVERSITY OF ILLINOIS AT URBANA-CHAMPAIGN JANUARY 2014
Disaster Recovery Planning
NASA IV & V ANNUAL WORKSHOP 202 The 4th International Workshop on Independent Verification & Validation of Software Disaster Recovery Planning Divya Krishnamoorthy Mailam Engineering College, Mailam. (Affiliated
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE
TESTIMONY OF DANIEL DUFF VICE PRESIDENT - GOVERNMENT AFFAIRS AMERICAN PUBLIC TRANSPORTATION ASSOCIATION BEFORE THE HOUSE COMMITTEE ON GOVERNMENT REFORM ON THE 9/11 COMMISSION RECOMMENDATIONS ******* August
EMP... Electromagnetic Pulse. one of the greatest threats facing technology-driven clients today
EMP... Electromagnetic Pulse one of the greatest threats facing technology-driven clients today Do you remember in the movie Oceans Eleven when Las Vegas was rendered powerless by an EMP event? That could
ACE3600 HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT
HIGH PERFORMANCE MONITORING & CONTROL REMOTE TERMINAL UNIT PAGE 1 EMPOWER YOUR SCADA NETWORK Utilities, now more than ever, are facing newer and greater hurdles. Multiple wired and wireless communication
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013
+ Increasing Energy Reliability & Resiliency NGA Policy Institute for Governors' Energy Advisors Denver Colorado, September 11, 2013 Jeffrey R. Pillon, Director, Energy Assurance Programs National Association
Tools and Operational Data Available. 15.12.2015 1 st RESOLUTE Workshop, Florence
Tools and Operational Data Available Athens Transport Tools and Operational Data Operations Control Center (OCC): mimic panels, operations modi (full, downgraded, manual) Metro Security Systems: sensors
It also provides guidance for rapid alerting and warning to key officials and the general public of a potential or occurring emergency or disaster.
Emergency Support Function #2 Communications ESF Coordinator: Information Technology Department Support Agencies: Tucson Fire Department Parks and Recreation Department Tucson Police Department Tucson
Before the Federal Communications Commission Washington, D.C. 20554 ) ) ) ) ) ) ORDER. Adopted: September 17, 2015 Released: September 17, 2015
Before the Federal Communications Commission Washington, D.C. 20554 In the Matter of STATE OF MICHIGAN Request for Waiver of Section 90.179(a of the Commission s Rules ORDER Adopted: September 17, 2015
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
How To Understand The History Of Infrastructure Failures In Seattle
Infrastructure Failures Key Points Infrastructure is the network of utilities that supplies our basic needs for mobility, power, water, sewer and communications. This chapter covers major structural failures
HAZARD VULNERABILITY & RISK ASSESSMENT
Hazard Vulnerability Analysis Purpose and Scope A Hazard Vulnerability Analysis (HVA) evaluates risk associated with a specific hazard. During this analysis, the hazard is evaluated for its probability
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Methods for Assessing Vulnerability of Critical Infrastructure
March 2010 Methods for Assessing Vulnerability of Critical Infrastructure Project Leads Eric Solano, PhD, PE, RTI International Statement of Problem Several events in the recent past, including the attacks
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security
The Cisco and Pelco Industrial Wireless Video Surveillance Solution: Real-Time Monitoring of Process Environments for Safety and Security The Cisco and Pelco Industrial Wireless Video Surveillance Solution
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
BRYN MAWR COLLEGE EMERGENCY RESPONSE PLAN Revised 1/2016 (abridged)
BRYN MAWR COLLEGE EMERGENCY RESPONSE PLAN Revised 1/2016 (abridged) This document is a synopsis of the planning and preparation the College has undertaken to handle emergencies in a professional, efficient,
The case for rail transportation of hazardous materials
ABSTRACT The case for rail transportation of hazardous materials H. Barry Spraggins University of Nevada, Reno Safe transportation of hazardous materials in the United States is an important national issue.
GAO INFORMATION SECURITY. TVA Needs to Address Weaknesses in Control Systems and Networks. Report to Congressional Requesters
GAO United States Government Accountability Office Report to Congressional Requesters May 2008 INFORMATION SECURITY TVA Needs to Address Weaknesses in Control Systems and Networks GAO-08-526 May 2008 Accountability
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
Salem Community College Course Syllabus. Section I. Course Title: Principles of Emergency Management. Course Code: EME101.
Salem Community College Course Syllabus Section I Course Title: Principles of Emergency Management Course Code: EME101 Lecture Hours: 3 Lab Hours: 0 Credits: 3 Course Description: This is a three credit
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST. Developed by the Toolkit Working Group for the Media Security and Reliability Council
LOCAL RADIO STATION MODEL VULNERABILITY ASSESSMENT CHECKLIST Developed by the Toolkit Working Group for the Media Security and Reliability Council November 16, 2004 INDEX A. Introduction...1 1. Scope...1
Cyber security: Practical Utility Programs that Work
Cyber security: Practical Utility Programs that Work Securing Strategic National Assets APPA National Conference 2009 Michael Assante Vice President & CSO, NERC June 15, 2009 The Electric Grid - Challenges
MANITOBA EMERGENCY MANAGEMENT SYSTEM Ver. 2.1
SCHEDULE 1 MANITOBA EMERGENCY MANAGEMENT SYSTEM Ver. 2.1 1.0 INTRODUCTION 1.1 General Emergency Response Most emergencies are resolved within a comparatively short time by emergency responders attending
NCUA LETTER TO CREDIT UNIONS
NCUA LETTER TO CREDIT UNIONS NATIONAL CREDIT UNION ADMINISTRATION 1775 Duke Street, Alexandria, VA 22314 DATE: December 2001 LETTER NO.: 01-CU-21 TO: SUBJ: ENCL: All Federally Insured Credit Unions Disaster
The Vermont Legislative Research Shop
The Vermont Legislative Research Shop State Responses to Terrorism Every state has responded in some way to the events of September 11 th. Most states have named a Director of Homeland or a liaison to
Homeland Security Solutions
Homeland Security Solutions Homeland Security - RAD Solutions Many organizations in the public and private sectors today require Homeland Security (HLS) systems: Defense agencies and defense industries,
FHWA Emergency Transportation Operations Planning Documents
Emergency Transportation Operations Planning Documents U.S. Department of Transportation (USDOT)/Federal Highway Administration (FHWA) with the Intelligent Transportation Systems (ITS)/Joint Program Office
Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN
Draft 8/1/05 SYSTEM First Rev. 8/9/05 2 nd Rev. 8/30/05 EMERGENCY OPERATIONS PLAN I. INTRODUCTION A. PURPOSE - The University of Hawaii System Emergency Operations Plan (EOP) provides procedures for managing
Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are
White Paper Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are What You Will Learn The Internet of Things (IoT) is generating an unprecedented volume and variety of data.
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
Performs the Federal coordination role for supporting the energy requirements associated with National Special Security Events.
ESF Coordinator: Energy Primary Agency: Energy Support Agencies: Agriculture Commerce Defense Homeland Security the Interior Labor State Transportation Environmental Protection Agency Nuclear Regulatory
5-02-15. Andres Llana, Jr. INSIDE. Upper Management s Role; Delegating Responsibilities; Minimum Plan Outline; Business Impact Analysis
5-02-15 INFORMATION MANAGEMENT: STRATEGY, SYSTEMS, AND TECHNOLOGIES CONTINGENCY PLANNING FOR SMALL- TO MEDIUM-SIZED BUSINESSES Andres Llana, Jr. INSIDE Upper Management s Role; Delegating Responsibilities;
