Sie sind auf Seite 1von 17

Name Class Date Professor

Risk assessment Security strategy Preparedness, prevention, response, and recovery Organizational behavior and management Budget

Provide Citizens with Electricity Develop New and Innovative Approaches to Energy Safeguard Energy

Values: Safety, Justice, Fairness, Respect Goals: Safety, Performance, Value Strives for Reliability in Electric Transmissions Nurture Strong Relationships with Local Businesses Strong Code of Ethics Transformational Leaders

Physical Threats: Criminals, Terrorists, Natural Hazards IT Threats Personal Threats

Attacks to Cripple Energy Output Workplace Shooters Criminal Threats Cyber Criminals: Hackers, Malware, Unauthorized Users Natural Disasters Terrorist Attacks

#1 Needs Immediate Action: Physically Securing the Perimeter, Secure People, and Secure Information Systems #2 When Funds Come Available: Additional Security Measures #3 Long Term Planning: Establishing Written Security Policies and Training the Employees

Evacuation Routes Training Drills PA System Warnings Emergency Exits

Reduce Impact of Security Breach Prevent Security Breach Physical Security Measures Cyber Prevention Measures Establish Prevention Policies

Security Plan Contact First Responders Evacuate Facilities Following Safety Protocol

Search and Rescue Rebuild Coordinated Effort to Reestablish Operations Fix Structural Damage

Physical Security IT Security Personal Security

Total: $250,000 Physical Security budget $150,000 Fences around power stations security guards Video Cameras Keyless entry Security Alarms

IT Security $30,000 Antiviral software Encryption Software IT Security Policies Passwords Authorized Users

Personal Security $50,000 Lighting in parking garage Security Guards Video Cameras Organizational Training $20,000 IT Security Polices Emergency Preparedness Security Plan

Physical, Personal, and IT Security Organizational Behavior Risk Assessment Comprehensive Security Plan

Center for Disease Control. (2005). Preparing for a Bombing: A Common Sense Approach. Retrieved August 14, 2013 from http://emergency.cdc.gov/masscasualties/preparingterroristbombing.asp Gofin, R. (2005). Preparedness and response to terrorism: A framework for public health action. European Journal of Public Health, 15(1): pp. 100-104 IBM Corporation. (2012). Best practices for cyber security in the electric power sector. Retrieved July 21, 2013 from http://public.dhe.ibm.com/common/ssi/ecm/en/euw03064usen/EUW03064USEN.P DF Panda Energy. (2012). About Us. Retrieved July 21, 2013 from http://www.pandaenergy.com/Home/tabid/36/Default.aspx McGinnis, S. (2010). Organizational Behavior and Management Thinking. Retrieved August 8, 2013 from http://www.jblearning.com/samples/076373473x/3473x_ch03_4759.pdf Teller, T. (2013). The Biggest Cyber Security Threats of 2013. Retrieved July 21, 2013 from http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecuritythreats-of-2013

Das könnte Ihnen auch gefallen