- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
August 20, 2002.ppt
August 20, 2002 DOW RESTRICTED - For internal use only Dow Security Vulnerability Assessment Overview April, 2005 Outline Dow Background of the SVA process Overview of Dow SVA process steps Review the type of recommendations that are generated by Dow SVAs. Expectations about Dow site vulnerability Key issues identified during Implementation General General items, Public and Private Responsibilities of companies SVA Background After the 9/11/2001 attack on the WTC: Focus of US authorities on Process Industry Draft legislation (elimination of highly toxic materials, additional layers of protection) ACC proposal: Assessment first Mandatory in US Additional requirements will depend uponoutcome SVA Process Steps Screening of all manufacturing sites into 4 tiers based upon perceived consequences of an attack Used to prioritize the assessment work Established standard scope for SVAs undesired release of a hazardous (flammable or toxic) chemical with significant off-site consequences caused by either a potential outside (Terrorist or extremist) or an inside (disgruntled employee) adversary. Planning Gather data from site process plants, local law enforcement and site leadership Preliminary scenario consequence severity threat level used to identify high priority attack scenarios SVA Process Steps Perform Site Visit ESS audit – evaluates existing perimeter security and meets Security portion of EHS Audits SVA using Sandia Methodology confirms high priority scenarios (~ 2 hours per process plant) Interviews of site employees from process plants ESS Provide implementation support to site personnel Analysis of Findings Recommendations Consensus development of recommendations by SVA team Includes consideration for removal or reduction of the hazardous material as well as mitigation to deter, detect or delay an adversary. Impact of the recommendations is documented SVA Process Steps Final Report Communications SVA report written and agreed upon by site busines
您可能关注的文档
- Accessing and Using NCHS Data on the Web.ppt
- Accounting for Partnerships.ppt
- ACC最新数据分享.ppt
- ACEI在冠心病二级预防中的作用 (解读专家共识冠心病部分).ppt
- Achieve, Inc..ppt
- Achieving High Software Reliability.ppt
- Active LearningTechnology Tools!.ppt
- Ad Hoc IP Address Autoconfiguration.ppt
- Address Decoding.ppt
- Address Generation for Nanowire Decoders.ppt
- August 20, 2003.ppt
- Authority Control for the Semantic Web.ppt
- Authorware7.0中文版多媒体制作教程.ppt
- Automatic Set Instance Extractionusing the Web.ppt
- Automotive News World CongressJanuary 17, 2006.PPT
- Backbone Networks.ppt
- BackTracking Algorithms.ppt
- baihui001-情景探究:.ppt
- Balance of Payments.ppt
- Balance Sheet.ppt
文档评论(0)