Premium
Exercise “Oval”
Author(s) -
Spence Shan,
Thompson Phil,
Bova Richard
Publication year - 2013
Publication title -
journal ‐ american water works association
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.466
H-Index - 74
eISSN - 1551-8833
pISSN - 0003-150X
DOI - 10.5942/jawwa.2013.105.0151
Subject(s) - vulnerability (computing) , plan (archaeology) , terrorism , computer security , business , service (business) , political science , computer science , marketing , law , geography , archaeology
Domestic terrorism is on the rise in the United States, and protecting the water sector from these attacks is of vital importance. Preventing an attack from occurring in the first place is the best protection, but what do you do if an attack is successfully launched against your utility? Although utilities are required to complete vulnerability studies, and many have extensive plans in place to help prevent an attack, most are not prepared for what happens after an attack. This article discusses how utilities should have a plan in place to minimize the impact on their customers and to ensure a rapid restoration of service to an affected area.