Preview

security

Good Essays
Open Document
Open Document
39280 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
security
A Reference Security Management Plan for Energy Infrastructure
Prepared by the Harnser Group for the European Commission

Summer 2010

Under Contract TREN/C1/185/2009

A Reference Security Management Plan for Energy Infrastructure
Foreword
The European Union is developing its policy on critical energy infrastructures in relation to the European Programme for Critical
Infrastructure Protection (“EPCIP”) which considers measures that will enhance, where necessary, the level of protection of certain infrastructures against external threats.
The integrity of energy infrastructures and their reliable operation are key factors in ensuring the supply in energy, vital for the well-being of the citizens and the functioning of the economy.
For this reason energy infrastructure is considered as a priority for the implementation of the
EPCIP, hence the policy adopted in December 2008, under Council Directive 2008/114/EC on the identification and designation of European critical infrastructures and the need to improve their protection, has the energy sector in its scope. As one of a number of requirements, this
Directive included the creation of an Operator Security Plan for all infrastructures designated as European Critical.
The European Commission’s Directorate General for Energy tasked an external contractor to prepare a non-binding Reference Security Management Plan. This is intended to be a useful guidebook for operators of energy infrastructure Assets, systems or parts thereof, independent of its classification as European Critical or under other national category. This concentrates on malicious, human-origin threats, whilst paying attention to all related aspects of an operation.
The Reference Security Management Plan is written from the operator’s perspective, from the need to comply with existing national or international legal and technical frameworks, through to integrating good security risk management within the overall corporate

You May Also Find These Documents Helpful

  • Good Essays

    Chemistry Project 2

    • 566 Words
    • 1 Page

    a major source of energy for our national needs." The act's scope embraced all energy…

    • 566 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    Physical Security

    • 272 Words
    • 2 Pages

    This paper is to outline Riordan Manufacturing’s existing Information Security Systems, determine their weaknesses, and develop solutions to those weaknesses by addressing security issues in the areas of physical, network, data, and the web.…

    • 272 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Centre for the protection of National Infrastructure: Sources of Guidance on Security in the Telecommunications sector…

    • 1965 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Physical Security

    • 2606 Words
    • 11 Pages

    Risk assessment and physical security survey of any building is critical in order minimize to the venerability of being put to risk due to failure to install or put the necessary mechanism to curb such potential. There is a need for thorough analysis on the risk assessment and physical survey on implementation of practices, principles and procedures in installation security measures.…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Energy 101

    • 409 Words
    • 2 Pages

    To evaluate what factors contribute to how a society chooses to use energy resources, keeping in mind the availability and culture as well as the social, economic, political and environmental implications.…

    • 409 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Security

    • 409 Words
    • 2 Pages

    Michael Nhan SE578-Practices for Administration of Physical & Operations Security Prof: Rodney Smith How do Administrative, Technical, and Physical Controls introduce a false sense of security? According to research and studies, the leading broadband providers have accumulated a total of over 17.4 million high-speed Internet subscribers in the US” This means that in the United States alone there are more than 17 million computers with fast connections most of which are connected to the Internet 24 hours a day, 7 days a week and that number continues to grow. Having a false sense of security is very common among consumers who own and operate a PC within their homes. Nothing is ever secured. I would never say something is secured within the terms of information security. Administrative, Technical, and Physical introduce a false sense of security by the idea of what we use to safeguard sensitive data and protect consumers’ privacy. The idea of purchasing a virus protection identifies that all personal information will be safeguarded and protected, which gives consumers a false sense of security. Having a false sense of security means that I entrust beliefs that I’m guaranteed protection at all times and, that I should not be concerns about my computer being compromised because I took the necessary precautions in purchasing a virus protection. What are the consequences to the strategy if there are no verification practices? disclosure of proprietary corporate information. What can a firm do to bolster confidence in their Defense-in-Depth strategy? How do these activities relate to “Best Practices”? How can these activities be used to demonstrate regulatory compliance? Sarbanes-Oxley_Act. (n.d.). Wikipedia, the free encyclopedia. Retrieved September 21, 2008, from Reference.com website: http://dictionary.reference.com/browse/Sarbanes-Oxley_Act M2PressWIRE; 08/12/2008 Dublin: “Data New Report Details the Data Center Automation Solutions Market for 2007-2010"…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Energy Plan

    • 353 Words
    • 1 Page

    It is important for everyone to do their part to conserve energy. Our resources, such as water, natural gas, oil, coal and the water species are limited. We have to save some for the future. Another reason is that some of these resources pollute the environment. We have to be careful since it causes damage to the environment.…

    • 353 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    The difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in.…

    • 810 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Signed on December 19, 2007 by President Bush, the Energy Independence and Security Act of 2007 (EISA) aims to move the United States toward greater energy independence and security while increasing the production of clean renewable fuels. With prolonged demonstration and a commitment from both government as well as citizens’, to protect consumers from the inflation of oil prices when there are global factors that have effect on our economy. To overall increase the efficiency of products, buildings, and vehicles and improve the energy performance and overall usage of the Federal Government as well as consumers. To implement long term goals and regulation with the EPA to increase U.S. energy security, develop renewable fuel production, and improve vehicle fuel economy. (Energy Independence and Security Act, 2007)…

    • 1853 Words
    • 8 Pages
    Better Essays
  • Good Essays

    First energy is so important because the human population depends upon energy to light out homes, cook food, grow food, warm and cool our homes during the seasons. World energy consumption is on the rise ever year mostly in developing countries, but we can do our part to help through energy efficient appliances, home insulation, and even in our vehicles. We have to consider the effects of our actions on the environment and to move toward ways in which we create sustainability.…

    • 543 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Effects of a Cyber Attack

    • 791 Words
    • 4 Pages

    Moteff, J ; Copeland, C ; Fischer, John Critical Infrastructures: What Makes an Infrastructure Critical? Retrieved on May 2, 2010 from…

    • 791 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Solar Panel

    • 1931 Words
    • 6 Pages

    Institute for Energy Research. (2010, February 16). Retrieved from A Primer on Energy and the Economy: Energy 's Large Share of the Economy Requires Cautioin in Determining Policies that Affect it: http://www.instituteforenergyresearch.org/2010/02/16/a-primer-on-energy-and-the-economy-energys-large-share-of-the-economy-requires-caution-in-determining-policies-that-affect-it/…

    • 1931 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Sensible management of security risk will involve finding the most appropriate and cost-effective way of minimising risk through a combination of procedural, personnel and physical measures. This mix establishes a series of barriers that prevent or restrict unauthorised access or harm to resources. This is known as ‘security-in-depth’. It also puts in place mechanisms to detect and respond to security breaches within an acceptable timeframe.…

    • 372 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    To analyze various aspects such as process of electricity generation , injection of electricity into the transmission grid , issues of fuel shortage , future expansion , prospects such as conversion from natural gas to other energy sources , ecological and environmental impacts on the area , corporate social responsibility , human resources and managerial functions. To undertake situational analysis of any proposed or completed schemes in this direction.…

    • 8084 Words
    • 33 Pages
    Powerful Essays