lastID = -291634
Skip to main content Skip to top navigation Skip to site search
Top of page
  • My citations options
    Web Back (from Web)
    Chicago Back (from Chicago)
    MLA Back (from MLA)
Close action menu

You need to login to use this feature.

Please wait a moment…
Please wait while we update your results...
Please wait a moment...
Description: Access Water
Context Menu
Description: Book cover
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES
  • Browse
  • Compilations
    • Compilations list
  • Subscriptions
Tools

Related contents

Loading related content

Workflow

No linked records yet

X
  • Current: 2020-01-31 19:24:31 Administrator
  • 2020-01-31 19:24:30 Administrator
Description: Access Water
  • Browse
  • Compilations
  • Subscriptions
Log in
0
Accessibility Options

Base text size -

This is a sample piece of body text
Larger
Smaller
  • Shopping basket (0)
  • Accessibility options
  • Return to previous
Description: Book cover
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES

AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES

AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES

  • New
  • View
  • Details
  • Reader
  • Default
  • Share
  • Email
  • Facebook
  • Twitter
  • LinkedIn
  • New
  • View
  • Default view
  • Reader view
  • Data view
  • Details

This page cannot be printed from here

Please use the dedicated print option from the 'view' drop down menu located in the blue ribbon in the top, right section of the publication.

screenshot of print menu option

Description: Book cover
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES
Abstract
Utilities are under more and more requirements, many mandated by law, to protect their facilities and the public they serve from possible terrorist attack. Vulnerability Assessments are required and abundant resources are available to perform them. But once the threats are identified, what do we do about them?There are many vendors eager to sell you both classic and innovative solutions. With a basic understanding of security technologies, you can determine which technologies will be most effective and practical for your particular needs.This paper is designed to give you a general background in selecting and applying physical systems to reduce risks at water or wastewater utilities. It is presented from the viewpoint of the facility operations/constraints rather than advocating particular security hardware. In other words, general descriptions and features of equipment are discussed without endorsing specific brands or models. In some cases, simple operational countermeasures are recommended instead of adding hardware.First, we will briefly review the type of facilities (collection systems, pumping stations, treatment processes, main plant sites, remotes sites, offices and personnel entry, chemical delivery/storage, control systems) and the type of attacks (physical, cyber, chemical contaminant) that utilities face. We will also review typical “real world” issues such as budget, facility location issues and secure procurement.Security hardware is generally broken down into Detection, Delay and Response equipment. Examples of the pros and cons that you should be aware of with various security hardware in each of these categories will be reviewed next. This will include hardware types, facility operating considerations, capital and operating costs, maintenance, and most importantly appropriateness for different types of facilities.The new EPA-sponsored Security Product Guide website will be presented as a good source of information regarding particular security products and product types. The Guides provide information on product function, product features, appropriate applications, initial cost range, maintenance cost, longevity, and a list of manufacturers for a variety of products that can be applied for security purposes at wastewater facilities. Additional resources for obtaining further information will also be provided.
Utilities are under more and more requirements, many mandated by law, to protect their facilities and the public they serve from possible terrorist attack. Vulnerability Assessments are required and abundant resources are available to perform them. But once the threats are identified, what do we do about them?There are many vendors eager to sell you both classic and innovative solutions. With a...
Author(s)
Rochelle ChernikoffTimothy M. Schmitt
SourceProceedings of the Water Environment Federation
SubjectSession 90: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:8L.701;1-
DOI10.2175/193864704784136766
Volume / Issue2004 / 8
Content sourceWEFTEC
First / last page(s)701 - 711
Copyright2004
Word count346

Purchase price $11.50

Get access
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: Book cover
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES
Pricing
Non-member price: $11.50
Member price:
-291634
Get access
-291634
Log in Purchase content Purchase subscription
You may already have access to this content if you have previously purchased this content or have a subscription.
Need to create an account?

You can purchase access to this content but you might want to consider a subscription for a wide variety of items at a substantial discount!

Purchase access to 'AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES'

Add to cart
Purchase a subscription to gain access to 18,000+ Proceeding Papers, 25+ Fact Sheets, 20+ Technical Reports, 50+ magazine articles and select Technical Publications' chapters.

Details

Description: Book cover
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES
Abstract
Utilities are under more and more requirements, many mandated by law, to protect their facilities and the public they serve from possible terrorist attack. Vulnerability Assessments are required and abundant resources are available to perform them. But once the threats are identified, what do we do about them?There are many vendors eager to sell you both classic and innovative solutions. With a basic understanding of security technologies, you can determine which technologies will be most effective and practical for your particular needs.This paper is designed to give you a general background in selecting and applying physical systems to reduce risks at water or wastewater utilities. It is presented from the viewpoint of the facility operations/constraints rather than advocating particular security hardware. In other words, general descriptions and features of equipment are discussed without endorsing specific brands or models. In some cases, simple operational countermeasures are recommended instead of adding hardware.First, we will briefly review the type of facilities (collection systems, pumping stations, treatment processes, main plant sites, remotes sites, offices and personnel entry, chemical delivery/storage, control systems) and the type of attacks (physical, cyber, chemical contaminant) that utilities face. We will also review typical “real world” issues such as budget, facility location issues and secure procurement.Security hardware is generally broken down into Detection, Delay and Response equipment. Examples of the pros and cons that you should be aware of with various security hardware in each of these categories will be reviewed next. This will include hardware types, facility operating considerations, capital and operating costs, maintenance, and most importantly appropriateness for different types of facilities.The new EPA-sponsored Security Product Guide website will be presented as a good source of information regarding particular security products and product types. The Guides provide information on product function, product features, appropriate applications, initial cost range, maintenance cost, longevity, and a list of manufacturers for a variety of products that can be applied for security purposes at wastewater facilities. Additional resources for obtaining further information will also be provided.
Utilities are under more and more requirements, many mandated by law, to protect their facilities and the public they serve from possible terrorist attack. Vulnerability Assessments are required and abundant resources are available to perform them. But once the threats are identified, what do we do about them?There are many vendors eager to sell you both classic and innovative solutions. With a...
Author(s)
Rochelle ChernikoffTimothy M. Schmitt
SourceProceedings of the Water Environment Federation
SubjectSession 90: Security
Document typeConference Paper
PublisherWater Environment Federation
Print publication date Jan, 2004
ISSN1938-6478
SICI1938-6478(20040101)2004:8L.701;1-
DOI10.2175/193864704784136766
Volume / Issue2004 / 8
Content sourceWEFTEC
First / last page(s)701 - 711
Copyright2004
Word count346

Actions, changes & tasks

Outstanding Actions

Add action for paragraph

Current Changes

Add signficant change

Current Tasks

Add risk task

Connect with us

Follow us on Facebook
Follow us on Twitter
Connect to us on LinkedIn
Subscribe on YouTube
Powered by Librios Ltd
Powered by Librios Ltd
Authors
Terms of Use
Policies
Help
Accessibility
Contact us
Copyright © 2024 by the Water Environment Federation
Loading items
There are no items to display at the moment.
Something went wrong trying to load these items.
Description: WWTF Digital Boot 180x150
WWTF Digital (180x150)
Created on Jul 02
Websitehttps:/­/­www.wef.org/­wwtf?utm_medium=WWTF&utm_source=AccessWater&utm_campaign=WWTF
180x150
Rochelle Chernikoff# Timothy M. Schmitt. AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Web. 12 Oct. 2025. <https://www.accesswater.org?id=-291634CITANCHOR>.
Rochelle Chernikoff# Timothy M. Schmitt. AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES. Alexandria, VA 22314-1994, USA: Water Environment Federation, 2018. Accessed October 12, 2025. https://www.accesswater.org/?id=-291634CITANCHOR.
Rochelle Chernikoff# Timothy M. Schmitt
AFTER THE VULNERABILITY ASSESSMENT: AN OVERVIEW OF SECURITY THREATS AND PRACTICAL COUNTERMEASURES
Access Water
Water Environment Federation
December 22, 2018
October 12, 2025
https://www.accesswater.org/?id=-291634CITANCHOR