ISBN |
9781461401896 |
9781461401889 |
Author |
Clark, Robert M. |
Title |
Handbook of Water and Wastewater Systems Protection. |
Description |
1 online resource (528 pages) |
Contents |
Acknowledgement -- Contents -- Contributors -- 1 Securing Water and Wastewater Systems: An Overview -- 1.1 Introduction -- 1.2 History of Water Supply Vulnerability -- 1.3 Threats from Earthquakes -- 1.3.1 The Loma Prieta Earthquake -- 1.3.2 The Northridge Earthquake -- 1.3.3 Kobe City Earthquake -- 1.3.4 Technological and Institutional Adaptation -- 1.3.4.1 Technological Adaptations -- 1.3.4.2 Institutional Adaptations -- 1.4 Vulnerable Characteristics of US Water Supply Systems -- 1.5 The Threat of Terrorism to Urban Water Systems -- 1.5.1 Bioterrorism and Chemical Contamination -- 1.6 Countermeasures Against Terrorism -- 1.6.1 Physical Countermeasures -- 1.6.2 Sensor Networks -- 1.7 Cyber Security -- 1.7.1 Laws and Regulations Governing the Internet -- 1.7.2 Internet Recovery -- 1.7.3 Examples of Internet Interruption -- 1.7.3.1 Case Study -- The Slammer Worm -- 1.7.3.2 Case Study -- A Root Server Attack -- 1.7.3.3 Case Study -- The Baltimore Train Tunnel Fire -- 1.7.3.4 Case Study -- The September 11, 2001, Terrorist Attack on the World Trade Center -- 1.7.3.5 Case Study -- Hurricane Katrina -- 1.7.4 Cyber Attacks in the Public Sector -- 1.7.4.1 The ''Stuxnet'' Virus -- 1.8 Material to Be Included in This Book -- 1.8.1 Current State of Water Supply and Wastewater Systems Security: An Overview -- 1.8.2 Characteristics of Water and Wastewater Systems in the United States -- 1.8.3 Chemical and Microbiological Threats for Water System Contamination -- 1.8.4 Monitoring for Natural and Manmade Threats in Water and Wastewater Systems -- 1.8.5 Modeling Contaminant Propagation and Contaminant Threats -- 1.8.6 Case Study Applications -- 1.8.7 Distribution System Modeling, SCADA Systems, Security and Surveillance Systems -- 1.8.8 Institutional and Management Issues in Responding to Natural and Manmade Threats. |
1.8.9 Developing Techniques and Approaches for Natural and Manmade Threat Response -- 1.9 Summary and Conclusions -- References -- 2 Water/Wastewater Infrastructure Security: Threats and Vulnerabilities -- 2.1 Introduction -- 2.2 Why Secure Water Infrastructure? -- 2.3 Threats to Water Systems -- 2.3.1 Evolving Threat Environment -- 2.3.1.1 September 11 Terrorist Attacks -- 2.3.1.2 Hurricane Katrina -- 2.3.2 Threat Assessments -- 2.3.3 Natural Disasters -- 2.3.3.1 Human-Caused Incidents -- 2.3.3.2 External Threats -- 2.3.3.3 Internal Threats -- 2.3.3.4 Cyber Threats -- 2.3.4 Design Basis Threat -- 2.3.5 Continuity Threats to Workforce and Infrastructure -- 2.3.5.1 The Dual Threat: Aging Infrastructure and Aging Workforce -- 2.3.5.2 Aging Infrastructure -- 2.3.5.3 Interdependent Infrastructure Failures -- 2.3.5.4 Workforce Illness -- 2.4 Water System Vulnerabilities -- 2.4.1 Above-Ground Structures -- 2.4.2 Below-Ground Structures -- 2.4.3 SCADA and Cyber Systems -- 2.4.4 Vulnerability Assessments -- References -- 3 EPA Drinking Water Security Research Program -- 3.1 Background -- 3.2 Research Drivers -- 3.3 Objectives and Desired Outcomes -- 3.4 Water Security Research -- 3.4.1 Protection and Prevention -- 3.4.1.1 Blast Vulnerability Assessment Tool -- 3.4.1.2 Design and Renovation of Drinking Water Systems -- 3.4.1.3 Contingency Planning Following Disasters and Disruption of Service -- 3.4.2 Detection -- 3.4.2.1 Commercially Available Sensors/Detectors -- 3.4.2.2 Development of New Detectors -- 3.4.2.3 Threat Ensemble Vulnerability Assessment Research -- 3.4.2.4 Public Health Surveillance -- 3.4.2.5 Sampling and Analytical Methods -- 3.4.2.6 Improving Microbial Contaminant Detection -- Sample Concentration -- 3.4.3 Containment and Mitigation -- 3.4.4 Water Treatment and Infrastructure Decontamination -- 3.4.4.1 Inactivation of Biothreat Agents. |
3.4.4.2 Persistence of Contaminants in Pipes and Other Water System Infrastructure -- 3.4.4.3 Inactivation of Anthrax Spores in Decontamination Wash/Waste Water -- 3.4.4.4 Quantitative Structure Property Relationship Prediction of Chlorine Reactivity with Chemical Contaminants of Concern -- 3.4.5 Technology Testing and Evaluation Program -- 3.5 Research Outcomes -- 3.6 Future Direction -- Acronyms -- References -- 4 Drinking Water Critical Infrastructure and Its Protection -- 4.1 Introduction -- 4.2 Water Security Issues -- 4.2.1 Water Sector Dependencies -- 4.2.2 Critical Infrastructure Definition -- 4.2.3 Contaminants of Concern -- 4.2.3.1 Agency for Toxic Substances and Disease Registry (ATSDR) -- 4.2.3.2 Center for Disease Control (CDC) -- 4.2.3.3 US Environmental Protection Agency (USEPA) -- 4.2.3.4 Food and Drug Administration (FDA) -- 4.2.3.5 World Health Organization (WHO) Database -- 4.2.3.6 Water Information Sharing and Analysis Center (WaterISAC) -- 4.2.3.7 Chemical Weapons Convention -- 4.2.3.8 North Atlantic Treaty Organization (NATO) -- 4.2.3.9 US Department of Defense -- 4.2.3.10 National Institute of Justice (NIJ) -- 4.2.3.11 Congressional Research Service -- 4.3 Water Quality Security -- 4.3.1 Water Security Initiative (WSI) -- 4.3.2 Environmental Technology Verification (ETV) and Technology Testing and Evaluation (TTEP) -- 4.3.3 The Standardized Analytical Methods for Environmental Restoration Following Homeland Security Events (SAM) -- 4.3.4 Response Protocol Tool Box (RPTB) -- 4.3.5 Water Contaminant Information Tool (WCIT) -- 4.4 Water Quality Security Models -- 4.4.1 EPANET Family of Codes -- 4.4.2 TEVA's Sensor Placement Optimization Tool (SPOT) -- 4.4.3 CANARY -- 4.5 Physical Security -- 4.5.1 Physical Security Tools -- 4.6 Cyber Security -- 4.6.1 Specific Actions to Improve Implementation. |
4.6.2 Actions to Establish Essential Underlying Management Processes -- References -- 5 Wastewater Critical Infrastructure Security and Protection -- 5.1 Introduction -- 5.2 Wastewater Security Regulations -- 5.3 Early Warning System -- 5.3.1 Selection Criteria for an Early Warning System -- 5.3.2 Wastewater Contaminants of Concern Database -- 5.3.3 Wastewater Sensors -- 5.3.4 Sensor Locations -- 5.3.4.1 Local Conditions -- 5.3.4.2 System-Wide and Topological Factors -- 5.3.5 Anomaly Detection -- 5.4 Security Incidents: Consequences and Response -- 5.4.1 Decontamination -- 5.4.2 Response to Wastewater Treatment from CBR -- 5.4.3 Response to Upset Event in Wastewater -- Normal Conditions -- 5.5 EPA-WERF Wastewater Security Research -- 5.6 Summary -- References -- 6 Protecting Water and Wastewater Systems -- 6.1 Introduction -- 6.2 Nebraskas Response to PL 1071--88 -- 6.2.1 Vulnerability Assessments -- 6.2.2 Progress in Completing Vulnerability Assessments -- 6.2.3 Response to Emergencies -- 6.3 Nebraska's Public Water System Emergency Response Plan -- 6.3.1 Implementing the Plan -- 6.3.1.1 Training Activities -- 6.4 Potential for Replication -- 6.5 Summary and Conclusions -- Appendix: Security Needs Assessment Summary -- 7 Spatial Distributed Risk Assessment for Urban Water Infrastructure -- 7.1 Introduction -- 7.1.1 Hazard Maps -- 7.1.2 Vulnerability Maps -- 7.1.3 Intrinsic Vulnerability Maps -- 7.1.4 Risk Maps -- 7.2 Materials and Methods -- 7.2.1 Performance Evaluation for Water Supply -- 7.2.2 Performance Evaluation for Urban Drainage -- 7.2.3 Vulnerability Assessment -- 7.2.4 Hazard Assessment -- 7.2.4.1 Flooding Hazard (h1) -- 7.2.4.2 Landslide Hazard (h2) -- 7.2.4.3 Avalanche Hazard (h3) -- 7.2.4.4 Debris Flow (h4) -- 7.2.5 Risk Assessment -- 7.2.6 Case Studies for Water Supply -- 7.2.7 Case Studies for Urban Drainage. |
7.3 Results and Discussion -- 7.3.1 Vulnerability Maps -- 7.3.2 Vulnerability Maps for WSSs -- 7.3.3 Vulnerability Maps for UDSs -- 7.3.4 Risk Maps -- 7.3.5 Summary of Risk Analysis -- 7.4 Conclusions -- References -- 8 US Water and Wastewater Critical Infrastructure -- 8.1 Introduction -- 8.2 Safe Drinking Water Act -- 8.3 Clean Water Act -- 8.4 Water and Wastewater Infrastructure -- 8.4.1 Drinking Water Infrastructure -- 8.4.2 Wastewater Infrastructure -- 8.4.2.1 Other US Water Infrastructure -- 8.5 Drinking Water Infrastructure Needs -- 8.6 Wastewater Infrastructure Needs -- 8.7 Summary and Conclusions -- References -- 9 Microbial Issues in Drinking Water Security -- 9.1 Introduction -- 9.2 Bio-threat Agents -- 9.3 Persistence -- 9.4 Detection -- 9.5 Treatment -- 9.6 Summary -- References -- 10 Rapid Detection of Bacteria in Drinking Water and Wastewater Treatment Plants -- 10.1 Introduction -- 10.2 Waterborne Pathogens -- 10.3 History of Water System Contamination -- 10.3.1 Recent Water Contamination Experience in the USA -- 10.3.1.1 Cabool Missouri Case Study -- 10.3.1.2 Gideon, Missouri Case Study -- 10.3.1.3 Walkerton, Canada Case Study -- 10.3.1.4 Cryptosporidium Outbreak in Milwaukee -- 10.4 Need for Development of a Rapid Detection Method -- 10.5 Method Development -- 10.5.1 Sample Filtration -- 10.5.2 ATP Bioluminescence -- 10.5.3 Bacterial Enumeration: AODC, DVC, and HPC -- 10.6 Method Validation -- 10.6.1 Collection of Water Samples -- 10.6.2 Public Water Supplies in France -- 10.6.3 Results and Discussion -- 10.7 Summary and Conclusions -- References -- 11 Chlorine Residual Management for Water Distribution System Security -- 11.1 Introduction and Background -- 11.2 Vulnerability Assessment Using Chlorine Residual Modeling -- 11.3 Chlorine Sensors for Nonspecific Event Detection -- 11.4 Booster Response to Low Chlorine. |
11.5 Future Directions in Chlorine Sensing for Drinking Water Distribution System Control. |
Subject |
Sewage -- Protection |
Water-supply -- Protection |
Waterworks -- Protection |
Other Author |
Electronic books. |
Other name(s) |
Hakim, Simon |
Ostfeld, Avi |
Ebook Link |
Find Ebook Central in MyGUtech |
Links to Related Works |
Subject References:
Authors:
|