Free Essay

Industrial Security Responsibilities and Losses

In: Social Issues

Submitted By ahchilds11
Words 796
Pages 4
Industrial Security Responsibilities and Losses
March 8, 2014
Aric Childs

“Industrial security is the portion of internal security, which refers to the protection of industrial installations, resources, utilities, materials, and classified information essential to protection from loss or damage”(McGraw-Hill Dictionary, 2003). Industrial Security is used to protect industrial machines and plants against unauthorized access, sabotage, and malicious manipulation.

Risk analysis is the first step to determine security measures. The risk analysis is an important precondition for Security Management relating to a plant or machine, aimed at identifying and assessing individual hazards and risks. Typical content of a risk analysis include identification of threatened objects, analysis of value and damage potential, threat and weak points analysis, identification of existing security measures, and risk assessments. The identified and unacceptable risks must, by way of suitable measures, be ruled out or typically reduced. Which risks are ultimately acceptable can only be specified individually for the application concerned. However, neither a single measure nor a combination of measures can guarantee 100% security.

Industrial Security is not just a question of technical implementation, but rather a ongoing process which also has to be understood as a management task. Depending on the particular risks inherent in the automation system, appropriate organizational and technical measures must be taken and regularly reviewed.
Maximum security is only possible in close cooperation between all involved parties

There are two parts to security measures physical security and network security. Physical security measures and processes to prevent access by unauthorized persons to the plant. Risks with physical security include access by unauthorized persons to production premises / building, physical damage to or changing of production equipment, and loss of confidential information through spying.

Network security is the protection of automation components based on segmented production networks. Ethernet-based fieldbus systems are well established in today’s automation solutions because of their advantages like performance and open communication from control level to field level. However this trend also leads to increased risks, which have to be addressed by security measures. “Network protection mechanism like firewalls, which blocks or regulates communication between office and plant networks. Segmentation of production networks in different secured automation networks” (Montague, 2010). This protects automation components within these cells against unauthorized access, network overload, etc.

Causes of industrial loss can vary. A most common cause usually involves money. Employees find it extremely difficult to get leave with pay. Employees also become more and more conscious about self-respect. Tempers flare when they are insulted or instigated by their superiors. Most of the time, extra bonus is not paid, or not paid on time. This also causes industrial conflicts. Sometimes, employees are unfairly relieved from their jobs. Nevertheless, their colleagues unite and fight for the rehiring of their relieved colleagues. Most industries have unhygienic and unsafe working conditions. This puts pressure on workers' health.

Consequences of industrial loss can be extreme. Unrest and unnecessary tensions overwhelm the hearts and minds of all the people involved which is laborers and senior management. “There is economic loss due to conflicts because conflicts may result in strikes and lock-outs. This causes low or no production resulting in industrial loss. Industrial losses may also cause economic depression because many industries are interlinked. A problem in one industry may drastically affect another industry. The lives of low-level laborers become worse when they are out of work. They may be the only working members of the family, and their joblessness may lead everyone in the family to poverty” (Didier, 2012). When industrial conflicts get out of hand, they become a threat to peace and security. Workers may resort to violence and indulge in sabotage.

Possible consequences of security incidents include loss of system availability, impairment of system performance manipulation or loss of data, loss of production control, environmental disaster, risk of death and serious injury, damage to company image, and financial loss.

In conclusion, industrial Security is used to protect industrial machines and plants against unauthorized access, sabotage, and malicious manipulation. There are two parts to security measures physical security and network security. Physical security measures and processes to prevent access by unauthorized persons to the plant. Network security is the protection of automation components based on segmented production networks.

References

industrial security. (n.d.) McGraw-Hill Dictionary of Scientific & Technical Terms, 6E. (2003). Retrieved March 8 2014 from http://encyclopedia2.thefreedictionary.com/industrial+security

Montague, J. (February 4, 2010). Wider-Scope Security. In Security. What Does It Really Mean for You and Your Industrial Systems?. Retrieved March, 8, 2014, from http://www.controldesign.com/articles/2010/securityin10q1/.

Didier, P, (February 4, 2012). Industrial Security Trends & Best Practices. In automation. Retrieved March, 8, 2014, from http://www.automation.com/automation-news/article/industrial-security-trends-best-practices.

Similar Documents

Premium Essay

Health Care

...Security and Privacy Funmi Fashakin HCS/533 June 10, 2013 Aimee Kirkendol Security and Privacy Patient security and privacy is one of health care organization fundament responsibility in meeting the organization objectives and providing services to the community the organization serves. Patients’ health care information are expected to be kept confidential and protected, there is a legal and ethical responsibility binding health care organization to protect and to develop a plan within the organization to protect patients’ medical records. There is always a privacy concern when patients’ medical data information are not protected and secured during a natural disaster. In this paper natural disaster scenario case of a small town on Gulf Coast that was struck by a hurricane will be discuss, also management detailed plan for patients’ medical record privacy and security will be discussed. The implementation of management plan for staff training and code of conduct will be discussed. A disaster is an adverse event as a result of natural processes of the Earth. It can cause losses of life, property damage, and electronic damage. Examples of natural disaster are flood, volcanic eruption, earthquakes, tsunamis, and other geologic processes. Actions to take when patients ask for their records Patients health care records serves many purposes to patients, it provides patients with accurate summary of patient’s health, patients have legal right......

Words: 2088 - Pages: 9

Free Essay

Oracle

..."Law on safety in emergency situations," "Labor Code of the Republic of Kazakhstan,» etc. Here are some of them that are most often manifested in the practice of any person. Knowing these definitions allow a deeper understanding of the problems associated with the existence of man in the course of employment and other activities. Article 1 of the "Labor Code of the Republic of Kazakhstan" is the following definition of occupational safety - safety system health and safety in the workplace, which includes legal, social, economic, organizational, technical, sanitary and epidemiological, medical and preventive treatment, rehabilitation and other activities and facilities. With this definition, the definition overlaps safety - the state of security of workers, to ensure comprehensive measures that exclude the impact of harmful and hazardous factors on workers in the course of employment. Of the two, the definition that is the main work - human activity aimed at creating material, wind and other values required for life and meet the needs of individuals and society. In connection with this definition of labor - the sphere of human activity is diverse: education, sports, culture, construction, etc. It should be noted that, in accordance with the basic axiom of human activities, which states that "any activity potentially dangerous." Among all kinds of educational activities may seem safer. However, without a systematic approach to educational activities can lead to a huge......

Words: 1517 - Pages: 7

Free Essay

Ferrari

...Annual Report At 31 December 2013 108th financial year Annual Report At 31 December 2013 All our reports are available at http://2013interactivereports.fiatspa.com Go to the online version of the Fiat Annual Reports to learn more about the Group's financial performance, sustainable development and other corporate information. | | Download our app www.fiatspa.com/mobileapp 3 General Meeting An Ordinary General Meeting of Shareholders will be held at 11 a.m. on 31 March 2014 (single call) at Centro Congressi Lingotto, Via Nizza 280, Turin to vote on the following: Agenda 1. Motion for Approval of the Statutory Financial Statements and Allocation of 2013 Net Result 2. Compensation and Own Shares: a) Compensation Policy pursuant to Article 123-ter of Legislative Decree 58/98 b) Authorization for the Purchase and Disposal of Own Shares Attendance and Representation Shareholders are entitled to attend the Meeting if they hold the right to vote at the close of business on the record date of 20 March 2014 and the Company has received the relevant confirmation of entitlement from an authorized intermediary. As provided by law, shareholders entitled to attend the Meeting may also be represented by proxy. The Company has appointed Computershare S.p.A. (Via Nizza 262/73, Turin) as the Designated Representative, pursuant to Article 135-undecies of Legislative Decree 58/98, upon whom shareholders may confer proxy and instruct to vote on all or some of the motions on the......

Words: 153121 - Pages: 613

Premium Essay

Ptaras Ar 2014

...A N N U A L R E P O R T 2 0 1 4 Contents 2 6 7 9 14 15 18 20 22 82 85 NOTICE OF ANNUAL GENERAL MEETING CORPORATE INFORMATION PROFILE OF DIRECTORS STATEMENT ON CORPORATE GOVERNANCE OTHER INFORMATION AUDIT COMMITTEE REPORT CHAIRMAN’S STATEMENT FINANCIAL HIGHLIGHTS FINANCIAL STATEMENTS ANALYSIS OF SHAREHOLDINGS LIST OF PROPERTIES PROXY FORM NOTICE OF ANNUAL GENERAL MEETING NOTICE IS HEREBY GIVEN that the Twenty-Fifth Annual General Meeting of the Company will be held at Mauna Lani A Room, Holiday Inn Kuala Lumpur Glenmarie, 1 Jalan Usahawan U1/8, 40250 Shah Alam, Selangor Darul Ehsan on Tuesday, 21st October 2014 at 9:30 a.m. for the following purposes:AGENDA 1. To table the Audited Financial Statements for the nancial year ended 30 June 2014 together with the Reports of the Directors and Auditors thereon. To approve the declaration of a nal 30 June 2014. dividend of 9% for the nancial year ended (Please refer to Note A) (Resolution 1) 2. 3. 4. To approve the Directors’ fees for the nancial year ended 30 June 2014. To re-elect the following Directors who retire in accordance with the Company’s Articles of Association :i) ii) iii) Madam Khoo Yok Kee (Article 73) Mr. Arnold Kwan Poon Keong (Article 73) Mr. Chiu Wei Wen (Article 73) (Resolution 2) (Resolution 3) (Resolution 4) (Resolution 5) (Resolution 6) 5. To re-appoint Messrs PricewaterhouseCoopers as Auditors of the Company and to authorise the......

Words: 11953 - Pages: 48

Premium Essay

1350

...from, disasters. FEMA also coordinates federal emergency management activities and planning for the continuity of government should national security be threatened. Since 1979 FEMA has administered a range of authorities that enable the agency to serve as the primary source of federal technical and financial assistance for emergency management. Among the types of aid provided through FEMA programs are grants and material to help disaster victims meet pressing needs such as food and shelter, education and training programs to improve the response capabilities of nonfederal officials, and mobile communications equipment. FEMA exercises little regulatory authority, but directives that underlie the agency’s mission authorize the agency to establish standards for reconstruction of buildings after a disaster declaration is issued, for the construction of federal buildings in earthquake-prone areas, and for the operation of first responder equipment. FEMA has responded to, and has helped communities prepare for, terrorist attacks in the United States. The Office of Homeland Security (OHS), established by President Bush subsequent to the attacks in 2001, has a similar, but more encompassing, mission related to disasters caused by terrorist actions. Congressional debate on the contours and framework for federal administration of homeland security might include...

Words: 9516 - Pages: 39

Premium Essay

Global Recession and Bangladesh

...could be a global crisis soon. Reckless lending by banks and financial institutions and slack regulatory system were at the root of the crisis, which is perhaps the gravest since the Great Depression of the 1930s. Amid a severe credit crunch, the rich economies have entered into a deep recession. IMF economists predict the global economic growth to fall from 5.6% in 2007 to 3.9% in 2008, and to 3.0% next year. Billions of dollars pumped by the rich and the emerging economies to bail out the distressed banks or to boost their economies have failed to stop the rot. Bangladesh is apparently immune from the crisis, its economy not being very tightly linked with the rest of the world. It has been enjoying a relatively healthy growth of exports, industrial activity and remittances. Yet, a prolonged recession in the rich countries may cause a slowdown in exports, inflows of remittances, foreign aid and FDI, thereby hurting GDP growth. IMF has said that GDP growth in Bangladesh this year will be lower – 5.5% instead of the officially projected 6.5%, if the global recession lingers. Bangladesh policy makers will need to stay alert to the possibility of the economy being hit by the global slump and adopt appropriate mitigating measures.] Introduction The United States economy is now experiencing a severe credit crunch (falling availability of credit), which is the most serious financial crisis since the Great Depression of the 1930s. The crisis that originated from plunging house......

Words: 6686 - Pages: 27

Premium Essay

Wall Street Financial Crisis

...Wall Street Financial Crisis Student’s Name Institution Date Paper Draft Introduction Background of the crisis. The effects and impact of the financial crisis. Results of preliminary reports. Sociological perspective of financial crisis The aspect of sociology in financial crises Senate’s investigative report The key players and their roles Why the workers remained unknowing The sociological explanation of the unpredictability of the crisis Conclusion Introduction The Financial Crisis of 2008 was described by economists, analysts and even sociologist as the worst and most devastating economic crisis since the 1930s Great Depression. It threatened a total collapse of huge financial institutions, banks bailout by governments, and major downturns in security's exchange around the world characterized this dark economic year. The housing sector in many areas in the world t also suffered, with the result being forced and unnoticed evictions (Coxe, 2005). Many people lost their jobs and there was a prolonged unemployment leading to family crisis and debts. Key businesses including banks failed and there was a huge decline in the consumer profits. The small unsecured financial institutions suffered the worst ever insolvency resulting from bank runs that characterized this period. The declines in consumer wealth were estimated in trillions of U.S. dollars. All these activities took a very short active phase, manifested as a liquidity crisis, and dated from August......

Words: 3596 - Pages: 15

Premium Essay

Casestudy

...SYLLABUS INDIAN BUSINESS ENIRONMENT MBA–2nd SEMESTER, M.D.U., ROHTAK External Marks : 70 Time : 3 hrs. Internal Marks : 30 UNIT-I Nature, components and determinatnts of business environment; basic nature of Indian economic system; relation size and growth of public and private corporate sector, social responsibility of business; broad features of India's now economic policy. UNIT-II Trend and pattern of industrial growth; review of industrial policy developments; industrial licensing policy; liberalisation of the private sector; trends and issues in corporate management; growth and problems of the small scale sector; public sector reforms and privatisation the problem of industrial sickness; MRTP Act, SICA and Industrial Disputes Act. UNIT-III Development banks for corporate Sector (IDBI, IFCI, ICICI) - trends pattern and policy; regulation of stock exchanges and the role of SEBI; banking sector reforms, challenges facing public sector banks; growth and changing structure of non bank financial institutions; problem of non performing assets in Indian Banks. UNIT-IV Trend and pattern of India's foreign trade and balance of payments; latest EXIM policy-main features; policy towards foreign direct investment; globalisation trends in Indian economy; role of MNC's; India's policy commitments to multilateral insitiutions - IMF, World Bank and WTO. NOTE : The question paper will be set by the external examiners. The external examiner will set 8......

Words: 21473 - Pages: 86

Premium Essay

Effect of Climate Change in Indian Economy

...IMPACT OF CLIMATE CHANGE POLICIES ON THE GROWTH OF THE INDIAN ECONOMY Submitted by: Kriti Bhardwaj Date: 1st December, 2010 1 ABSTRACT The most contentious global debate today is the obligations of the developed and the developing countries to take steps to reduce their carbon footprint. Though climate change is a danger for all countries-developed and developing alike, the quantum of responsibility for mitigating climate change is a debatable issue. There is a perceived divide between the obligations of the two worlds in which our planet is divided. The source of virtually all past emissions i.e. the developed world has a greater responsibility to take steps to reduce their carbon emissions substantially and help in stabilizing the environment which they disturbed to a large extent. This is the reason why they are subjected to binding targets of reducing their emissions by a set amount in all international agreements. However, the developing world is gearing towards development at a very fast pace and all development and industrialization pre-supposes the need of higher emissions. Due to this, the emission levels of this part of the world are bound to increase even more rapidly. Mitigating climate change in developing countries poses a fundamental challenge. For developing nations as a whole...

Words: 4400 - Pages: 18

Premium Essay

Security Systems in Bangalore

...Security System Security System, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack. Most Security System emphasize certain hazards. The principal security concerns are shoplifting and employee dishonesty. A typical set of categories to be protected includes the personal safety of people in the organization, such as employees, customers, or residents; tangible property, such as the plant, equipment, finished products, cash, and securities, such as highly classified national-security information or “proprietary” information (e.g., trade secrets) of private organizations. An important distinction between a security and protection system and public services such as police and fire departments is that the former employs means that emphasize passive and preventive measures. Security systems are found in a wide variety of organizations, ranging from government agencies and industrial plants to apartment buildings and schools. Sufficiently large organizations may have their own proprietary security systems or may purchase security services by contract from specialized security organizations. The origins of security systems are obscure, but techniques for protecting the household, such as the use of locks and barred windows, are very ancient. As civilizations developed, the distinction between passive and active security was recognized, and......

Words: 621 - Pages: 3

Premium Essay

This Research Paper Is an Outcome of a Detailed Study on the Title - Is Glass Ceiling Losing Its Relevance in 21st Century? the Research Is Based on the Secondary Data Published in the Internet and Other Printed Sources.

...SYLLABUS INDIAN BUSINESS ENIRONMENT MBA–2nd SEMESTER, M.D.U., ROHTAK External Marks : 70 Time : 3 hrs. Internal Marks : 30 UNIT-I Nature, components and determinatnts of business environment; basic nature of Indian economic system; relation size and growth of public and private corporate sector, social responsibility of business; broad features of India's now economic policy. UNIT-II Trend and pattern of industrial growth; review of industrial policy developments; industrial licensing policy; liberalisation of the private sector; trends and issues in corporate management; growth and problems of the small scale sector; public sector reforms and privatisation the problem of industrial sickness; MRTP Act, SICA and Industrial Disputes Act. UNIT-III Development banks for corporate Sector (IDBI, IFCI, ICICI) - trends pattern and policy; regulation of stock exchanges and the role of SEBI; banking sector reforms, challenges facing public sector banks; growth and changing structure of non bank financial institutions; problem of non performing assets in Indian Banks. UNIT-IV Trend and pattern of India's foreign trade and balance of payments; latest EXIM policy-main features; policy towards foreign direct investment; globalisation trends in Indian economy; role of MNC's; India's policy commitments to multilateral insitiutions - IMF, World Bank and WTO. NOTE : The question paper will be set by the external examiners. The external examiner will set 8 questions in all, selecting not......

Words: 21473 - Pages: 86

Free Essay

Foreign Economic Collection 2011

...COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E E X E C U T I V E October 2011 Ta b l e o f C o n t e n t s Executive Summary ................................................................................................................................ i Scope Note ........................................................................................................................................... iii US Technologies and Trade Secrets at Risk in Cyberspace.....................................................................1 The Appeal of Collecting in Cyberspace................................................................................. .....1 Security and attribution ....................................................................................................... 1 Faster and cheaper .............................................................................................................. 2 Extra-territoriality ................................................................................................................ 2 Large but Uncertain Costs........................................................................................................... 3 Pervasive Threat from Intelligence Adversaries and Partners ...............................................................4 China: Persistent Collector..............................................................................................

Words: 11021 - Pages: 45

Premium Essay

Annual Report

...Contents ANNUAL REPORT 2011 2 7 8 15 16 17 20 6 14 Notice of Annual General Meeting Corporate Information Corporate Governance Statement Statement on Corporate Social Responsibility Statement on Internal Control 24 26 27 87 92 25 Chairman’s Statement Corporate Structure 86 Financial Statements 91 List of Group Properties 94 Analysis of Shareholdings Proxy Form 19 Directors’ Profile 23 Audit Committee Report 2 UMS HoLDINGS BeRHAD (74125-V) ANNUAL RePoRt 2011 notice of ANNUAL GeNeRAL MeetING NotICe IS HeReBY GIVeN that the thirtieth Annual General Meeting of the Company will be held at Lumut 1 Room, Level 1, Vistana Hotel, No. 9 Jalan Lumut, off Jalan Ipoh, 50400 Kuala Lumpur on Monday, 26 March 2012 at 10:00 a.m. to transact the following business: Agenda 1. To receive the Audited Financial statements for the financial year ended 30 september 2011 and the Reports of the Directors and Auditors thereon. To approve the payment of Directors’ fees amounting to RM134,100.00 for the financial year ended 30 september 2011 (2010 : RM128,700.00). To declare a final dividend of 6% Gross (less Malaysian income Tax @ 25%) for the financial year ended 30 september 2011. To declare a special dividend of 4% Gross (less Malaysian income Tax @ 25%) for the financial year ended 30 september 2011. To consider and if thought fit, to pass the following resolution: “That Mr. Ng siow Hwa @ Ng Kok Hwa, who retires in accordance with section 129 (6) of the Companies Act, 1965, be and is......

Words: 33438 - Pages: 134

Premium Essay

A Framework for Prudential Regulation and Supervision of the Financial Sector

...number of countries experiencing significant banking problems has increased substantially in recent years - hitting industrial and developing countries alike - and the high costs and macroeconomic disruptions caused by banking crises have become a matter of increasing concern to the international financial community. Not since the Great Depression of the 1930's have so many banks failed as in the 1980's and the 1990's. A recent survey by the International Monetary Fund reported banking problems in 131 of its 181 member countries over this period, ranging from outright systemic crises to isolated causes of failing banks. We all remember the collapse of the Bank of Credit and Commerce International (BCCI) in 1990. There was the much publicised savings and loan debacle in the United States which cost some $150 billion. In Latin America, banks in four countries - Venezuela, Brazil, Mexico and Argentina - have recently had to struggle with crises of varying degrees of severity. The Scandinavian countries have also had their fair share of problems. In addition to these, there have been some very serious individual problems such as the collapse in February, 1995, of Britain's Barings Bank under the weight of ill-advised derivative deals carried out by a rogue trader. We recall. also the case of Credit Lyonnais, a state owned French Bank, which ran up losses of some...

Words: 5312 - Pages: 22

Free Essay

Response Attacks

...from your organization. Industrial spies may try to steal a company’s secret plans for a new product. Cyber-terrorists with political or religious motivations may attack an organization or government with which they disagree. Amateur hackers may access systems to plant their virtual flag and earn merit badges in the hacker community. Occasionally, bored teenagers may hack into a system just to prove they can. Cybercrimes have a direct impact on privacy. An organization’s failure to adequately protect information can lead to disaster, so the necessity for good data security is absolute, and a fiduciary responsibility of corporate management. However, even though data security and privacy have a relationship, the concept and practice of data security is generally geared toward restricting data access. This restriction does not automatically safeguard the privacy of users. If organizational policies on the use or sale of sensitive information are not appropriate, privacy problems can still surface, even though the information and technology are secure. In many ways, IT security specialists are at a disadvantage in their struggle against hackers. Attackers can mount assaults at their leisure, and can choose their targets at will. IT workers don’t enjoy the same luxury—they can never let their guard down, and must keep their systems secure at all times. The adverse impact of a hacking attack or intrusion can be described in terms of the following losses:...

Words: 592 - Pages: 3