Laserfiche WebLink
Document management portal powered by Laserfiche WebLink 9 © 1998-2015 Laserfiche. All rights reserved.
<br />FREESE AND <br />NICHOLS: <br /> <br />HELPING YOU <br /> <br />PROTECT YOUR <br /> <br />WATER SUPPLY <br /> <br />Innovative approaches. . <br /> <br />.. <br /> <br />Fr.... ... Nicholl <br /> <br />practical results <br /> <br /> <br />4. Assessment of the likelihood (qualitative prob- / <br />ability) of such malevolent acts from defined V <br />threat sources (e.g. terrorist, insider, determined <br />vandal, casual vandal, etc.) <br /> <br />5. Systematic site characterization of the water <br />system to i ncl ude the collection of performance <br />data on: <br />· Important facilities, processes and assets <br />Physical protection system features of deter- / / / / <br />renee, detection, delay and response V V V V <br />· Cyber protection system features <br />· Security policies and procedures and compli- <br />ance with same <br /> <br />6. The approach to the VA is "performance-based," <br />meaning that it evaluates the risk to the water <br />system based on the effectiveness of the security <br />system against the specific malevolent acts <br />determined in the initial step. <br /> <br />./ <br /> <br />././ <br /> <br />7. The VA determines the most critical assets <br />(targets) in a water system, details their inter- <br />relationships within other assets in the system, <br />identifies the consequences of malevolent acts <br />that could be directed against them, and evalu- <br />ates the effectiveness of both existing and pro- <br />posed protection systems. <br /> <br />./ <br /> <br />././ <br /> <br />8. The VA identifies a system's vulnerabilities and <br />provides a prioritized plan for security upgrades, <br />modifications of operational procedures, and/or <br />policy changes to mitigate identified risks to <br />critical assets, The VA also provides a basis for <br />comparing the cost of protection against the risks <br />posed. <br /> <br />././././ <br /> <br />Vulnerability A"e>smpn( and Emergency Re,pome Plan SOQ <br /> <br />page 1-1 <br />