Premium
Applying the Threat Response ‘Toolbox’
Author(s) -
Kufus Martin
Publication year - 2006
Publication title -
opflow
Language(s) - English
Resource type - Journals
eISSN - 1551-8701
pISSN - 0149-8029
DOI - 10.1002/j.1551-8701.2006.tb01846.x
Subject(s) - toolbox , agency (philosophy) , computer security , event (particle physics) , process (computing) , order (exchange) , incident response , internet privacy , business , threat assessment , risk analysis (engineering) , computer science , environmental planning , sociology , environmental science , social science , physics , finance , quantum mechanics , programming language , operating system
This article discusses the U.S. Environmental Protection Agency's (USEPA's) publication titled, “Response Protocol Toolbox: Planning for and Responding to Drinking Water Contamination Threats and Incidents.” The article focuses on how the use of a federally recommended decision‐making process during an ambiguous and possibly threatening situation could bring order to a utility's crisis response. The toolbox defines three possible threat levels and lists eight threat warnings that may be the first indication of a possible act of sabotage. Of the eight threat warnings, the article discusses the two most likely to occur, which are notification by the perpetrator, and discovery of a security breach at a water facility. The article discusses the next two steps to take simultaneously after determining that there is a possible threat, actions for a credible threat, and information supporting confirmation of a contamination event.