My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2003-200
CBCC
>
Official Documents
>
2000's
>
2003
>
2003-200
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/17/2016 1:28:38 PM
Creation date
9/30/2015 6:43:09 PM
Metadata
Fields
Template:
Official Documents
Official Document Type
Work Authorization
Approved Date
08/12/2003
Control Number
2003-200
Agenda Item Number
11.J.3
Entity Name
Camp Dresser & McKee
Subject
Work Authorization #7
Vulnerability and Security Evaluation
US Environmental Protection Agency Bioterrorism Act
Archived Roll/Disk#
3162
Supplemental fields
SmeadsoftID
3346
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
11
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
TASK 2. 0 - CRITICAL FACILITIES IDENTIFICATION AND EVALUATION <br /> 2. 1 Facility Identification. CONSULTANT will work with IRCUD staff to identify the <br /> utility' s critical facilities. The facilities will include, but may not be limited to, the <br /> following: <br /> All Existing Wells <br /> Water Treatment Plants <br /> Ground and Elevated Storage Tanks <br /> Distribution System <br /> SCADA System <br /> Computer Networks <br /> 2 . 2 Prioritization of Facilities . CONSULTANT will evaluate and prioritize the facilities <br /> utilizing the pair-wise comparison methodology in accordance with RAM- WsM The pair- <br /> wise comparison will then be evaluated based on the goals established by <br /> CONSULTANT (Task 1 ) to develop a weighted score for each facility. Using this <br /> information, CONSULTANT will develop a table of ranked critical facilities . <br /> TASK 3. 0 - THREAT IDENTIFICATION AND ASSESSMENT <br /> 3 . 1 Threat Identification. CONSULTANT will conduct a threat workshop to consider three <br /> categories of threats - insider, outsider, and cyber. Threat levels will be established for <br /> insider, outsider, and cyber threats . This will determine the Design Basis Threat for the <br /> remainder of the analysis . <br /> 3 .2 Threat Assessment. The information produced in Task 3 . 1 will be assembled, and an <br /> assessment of the likelihood of that threat will be assessed . A table will be developed for <br /> each type of threat that provides historical information, motivation, tactics, numbers, <br /> equipment, weapons intelligence, technical skills, financial resources, and any other <br /> critical information concerning a potential threat. The assessment will include working <br /> with local law enforcement, state law enforcement, and federal agencies (if necessary) to <br /> evaluate: <br /> The history of threats to the facilities <br /> Capabilities of those involved <br /> Methods of attack <br /> Access to critical assets <br /> TASK 4.0 - FAULT TREE ANALYSIS OF CRITICAL ASSETS <br /> 4. 1 Fault Tree Analysis . CONSULTANT will conduct a fault tree analysis on IRCUD' s <br /> critical facilities, identified in Task 2, to determine the critical assets. The consequences <br /> of the undesirable events will be identified and CONSULTANT will develop a table of <br /> those consequences, ranked according to their impact on the mission statement <br /> objectives . The preliminary fault tree analysis will be reviewed with IRCUD in a one-day <br /> meeting to gain consensus on the most critical assets that need to be protected and <br /> numerical values in the consequence table. <br /> B-2 <br /> mh1244 <br />
The URL can be used to link to this page
Your browser does not support the video tag.