comprehensive security master plan
TRANSCRIPT
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 1/17
NameClassDate
Professor
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 2/17
Risk assessment
Security strategy
Preparedness, prevention, response, and
recovery
Organizational behavior and management
Budget
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 3/17
Provide Citizens with Electricity
Develop New and Innovative Approaches toEnergy
Safeguard Energy
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 4/17
Values: Safety, Justice, Fairness, Respect
Goals: Safety, Performance, Value
Strives for Reliability in Electric Transmissions
Nurture Strong Relationships with LocalBusinesses
Strong Code of Ethics
Transformational Leaders
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 5/17
Physical Threats: Criminals, Terrorists, NaturalHazards
IT Threats
Personal Threats
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 6/17
Attacks to Cripple Energy Output
Workplace Shooters
Criminal Threats
Cyber Criminals: Hackers, Malware,Unauthorized Users
Natural Disasters
Terrorist Attacks
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 7/17
#1 Needs Immediate Action: Physically Securingthe Perimeter, Secure People, and SecureInformation Systems
#2 When Funds Come Available: AdditionalSecurity Measures
#3 Long Term Planning: Establishing WrittenSecurity Policies and Training the Employees
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 8/17
Evacuation Routes
Training Drills
PA System Warnings
Emergency Exits
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 9/17
Reduce Impact of Security Breach
Prevent Security Breach
Physical Security Measures
Cyber Prevention Measures
Establish Prevention Policies
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 10/17
Security Plan
Contact First Responders
Evacuate Facilities
Following Safety Protocol
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 11/17
Search and Rescue
Rebuild
Coordinated Effort to Reestablish Operations
Fix Structural Damage
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 12/17
Physical Security
IT Security
Personal Security
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 13/17
Total: $250,000
Physical Security budget $150,000
Fences around power stations
security guards
Video Cameras
Keyless entry
Security Alarms
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 14/17
IT Security $30,000
Antiviral software
Encryption Software
IT Security Policies
Passwords
Authorized Users
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 15/17
Personal Security $50,000
Lighting in parking garage
Security Guards
Video Camera’s
Organizational Training $20,000
IT Security Polices
Emergency Preparedness
Security Plan
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 16/17
Physical, Personal, and IT Security
Organizational Behavior
Risk Assessment
Comprehensive Security Plan
7/27/2019 Comprehensive Security Master Plan
http://slidepdf.com/reader/full/comprehensive-security-master-plan 17/17
Center for Disease Control. (2005). Preparing for a Bombing: A Common SenseApproach. Retrieved August 14, 2013 from
http://emergency.cdc.gov/masscasualties/preparingterroristbombing.asp Gofin, R. (2005). Preparedness and response to terrorism: A framework for public health
action. European Journal of Public Health, 15(1): pp. 100-104 IBM Corporation. (2012). Best practices for cyber security in the electric power sector.
Retrieved July 21, 2013 from
http://public.dhe.ibm.com/common/ssi/ecm/en/euw03064usen/EUW03064USEN.PDF Panda Energy. (2012). About Us. Retrieved July 21, 2013 from
http://www.pandaenergy.com/Home/tabid/36/Default.aspx McGinnis, S. (2010). Organizational Behavior and Management Thinking. Retrieved
August 8, 2013 fromhttp://www.jblearning.com/samples/076373473x/3473x_ch03_4759.pdf
Teller, T. (2013). The Biggest Cyber Security Threats of 2013. Retrieved July 21, 2013 from
http://www.forbes.com/sites/ciocentral/2012/12/05/the-biggest-cybersecurity-threats-of-2013