LEADER 05236nam 22006134a 450 001 9910143565803321 005 20170809162028.0 010 $a1-280-51733-6 010 $a9786610517336 010 $a0-470-05454-9 010 $a0-470-05453-0 035 $a(CKB)1000000000355288 035 $a(EBL)266947 035 $a(OCoLC)77496607 035 $a(SSID)ssj0000243183 035 $a(PQKBManifestationID)11188235 035 $a(PQKBTitleCode)TC0000243183 035 $a(PQKBWorkID)10321630 035 $a(PQKB)10624763 035 $a(MiAaPQ)EBC266947 035 $a(EXLCZ)991000000000355288 100 $a20060301d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSecuring utility and energy infrastructures$b[electronic resource] /$fLarry Ness 210 $aHoboken, N.J. $cWiley$dc2006 215 $a1 online resource (358 p.) 300 $aIncludes index. 311 $a0-471-70525-X 327 $aCONTENTS; 1 INADEQUATE SECURITY TODAY; History of the Utility/Energy Industry; Federal Legislative Issues; Deregulation of the Utility Industry; The Role of Federal and State Utility Regulators; Post 9/11 Information Sources; Risk Assessment versus Needs Assessment; 2 THE ECONOMIC IMPACT OF A TERRORIST ATTACK; Utility Industry-Prime Targets for Terrorists; Major Types of Threats; Use the Infrastructure as a Weapon Against Us; Create Power Surges; Cyber Attack; Lack of Vital Spare Parts; Terrorists' Goals; Jihadism Began in the 11th Century; Terrorism in America; No Stopping Terrorism 327 $aImpact Comparisons versus Other CrisesImpact on the United States Economy; Costs of Recovery; Direct Impacts; Indirect Impacts; Insurance; Airlines; Defense Spending; Longer Term Impacts; 3 WHAT IS BEING DONE TO PROTECT THE UTILITY INDUSTRY?; Federal Responses; Nuclear Plant Security; Federal Anti-Cyber-Attack Programs; State Responses; New York's Model Program; Other State Organizations; Utility/Energy Industry Response; Electrical Substations; Natural Gas Facilities; Nuclear Utility Security; How Do We Move Forward?; Progress at State and Federal Levels; The Role of Insurance Companies 327 $aWho Pays?4 THE POST-9/11 SECURITY ASSESSMENT PROCESS; New Security Needs; Physical Security Assessment Process; Information and Computer Security Assessment Process; Computer Security; Biochemical and Anthrax Security Assessment Process; Pre-employment and Annual Screening; Due Diligence Screening; Security Culture Change Training; 5 SECURITY CRISIS MANAGEMENT PLANNING; How to Increase Safety; Security Risk Assessment Process; Materials and Procedures to Have in Advance; Outside Risks; Inside Risks; Crisis Management Planning; Crisis Management Team; Call Response Team 327 $aReview of Emergency PreparednessResource Analysis; Human Resources; Document Review; Physical Assets; Hazard Analysis; Vulnerability Assessment; Gap Analysis; Business Continuity Planning; Levels of Disaster; Key Business Continuity Tasks; Conduct a Business Impact Analysis; Track Revenue Flow through Business Units; Create Recovery Teams; Disaster Recovery Plan; Summary of Emergency Procedures; Level 1 Responsibilities; Business Continuity Coordinator; Level 2 Responsibilities; Level 3 Responsibilities; Security Policies, Procedures- and Guidelines; Selecting a Disaster Recovery Center 327 $a6 CRIMINAL JUSTICE COMMUNITY ROLESCommunication and Coordination; The Criminal Justice Community; Department of Homeland Security; Federal Agencies; State Authorities; Local Police; Emergency Personnel; Effects of the Disaster Experience; Expand Your Security Program; Guidelines During and After an Incident; 7 SECURITY TECHNOLOGY; Current Utility Security Technologies; Windows Security; Mitigating the Risks; Improving SCADA System Security; Anti-Spyware and Anti-Virus Solutions; Encryption; Firewalls; NERC Meets FERC Security Mandates; Future Technology Requirements; Ever-Growing Demands 327 $aThe Need for More Electricity 330 $aThe latest security measures for utility and energy industriesAddressing the growing post-9/11 concern about the safety of the utility and energy industries, SecuringUtility and Energy Infrastructures presents a detailed blueprint for safeguarding these vital fields. This comprehensive guide discusses how to protect the electric, oil and gas, nuclear, telecommunications, and water industries from a conventional or terrorist attack.Written for anyone who is charged with the safety of these industries, Securing Utility and Energy Infrastructures explains how to look for and monit 606 $aPublic utilities$xSecurity measures$zUnited States 606 $aEnergy industries$xSecurity measures$zUnited States 608 $aElectronic books. 615 0$aPublic utilities$xSecurity measures 615 0$aEnergy industries$xSecurity measures 676 $a333.790684 676 $a333.790973 700 $aNess$b Larry$0854311 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143565803321 996 $aSecuring utility and energy infrastructures$91907743 997 $aUNINA