My WebLink
|
Help
|
About
|
Sign Out
Home
Browse
Search
2003-200
CBCC
>
Official Documents
>
2000's
>
2003
>
2003-200
Metadata
Thumbnails
Annotations
Entry Properties
Last modified
11/17/2016 1:28:38 PM
Creation date
9/30/2015 6:43:09 PM
Metadata
Fields
Template:
Official Documents
Official Document Type
Work Authorization
Approved Date
08/12/2003
Control Number
2003-200
Agenda Item Number
11.J.3
Entity Name
Camp Dresser & McKee
Subject
Work Authorization #7
Vulnerability and Security Evaluation
US Environmental Protection Agency Bioterrorism Act
Archived Roll/Disk#
3162
Supplemental fields
SmeadsoftID
3346
There are no annotations on this page.
Document management portal powered by Laserfiche WebLink 9 © 1998-2015
Laserfiche.
All rights reserved.
/
11
PDF
Print
Pages to print
Enter page numbers and/or page ranges separated by commas. For example, 1,3,5-12.
After downloading, print the document using a PDF reader (e.g. Adobe Reader).
View images
View plain text
4 . 2 Consequences and Protection of Critical Assets . Based on the Fault Tree Analysis and <br /> the Consequences Table, a list of the most critical assets that must be protected will be <br /> developed by CONSULTANT. <br /> TASK 5. 0 - EVALUATION OF SECURITY SYSTEMS/PROCEDURES <br /> 5 . 1 Site Visits . CONSULTANT will visit the sites of the three most critical facilities within <br /> IRCUD' s water system and catalogue the detection devices, delay devices, and response <br /> .procedures used for each of the items identified as critical assets . The types of security <br /> systems to be evaluated will include, but not be limited to : <br /> Detection Systems: <br /> 1 . Cameras <br /> 2. Infrared Detectors <br /> 3 . Intruder Alarms <br /> 4, Administrative Procedures <br /> Delay Devices. <br /> 1 . Fences <br /> 2. Doors <br /> 3 . Gate <br /> 4 . Locks <br /> Response Systems: <br /> 1 . Employee Response <br /> 2. In-House Security Response <br /> 3 . Police, Law Enforcement Response <br /> 5 . 2 Evaluation of Security Systems . CONSULTANT will evaluate the security systems in <br /> place at each facility based on the Design Basis Threat scenarios developed in Task 3 . 0 . <br /> TASK 6.0 - RISK ASSESSMENT/RISK REDUCTION <br /> 6 . 1 Risk Assessment. CONSULTANT will use the RAM-WsM risk equation to determine the <br /> vulnerability of the water system to the Design Basis Threat. <br /> 6 . 2 Risk Reduction. CONSULTANT will evaluate options for reducing IRCUD' s risk to the <br /> Design Basis Threat and develop a list of improvements needed to reduce that risk. The <br /> CONSULTANT will review the current conditions and proposed future conditions <br /> during and after the demolition/ conversion of the East WTP to a remote booster <br /> pumping facility. <br /> All improvements will be evaluated based on capital costs . A prioritized list of <br /> recommended improvements will then be provided to IRCUD along with an <br /> implementation plan and costs . <br /> B-3 <br /> mh1244 <br />
The URL can be used to link to this page
Your browser does not support the video tag.