Midwest Water & Wastewater Technology Conference
6/5/2014
When: | Thursday, June 5, 2014 Visit Exhibitors from 7:30 to 8:30 AM |
Where: | Map this event » College of Lake County, C-Building 19351 West Washington Street Grayslake, Illinois 60030 United States |
Contact: | Lisa Hoffhines lisa@isawwa.org Phone: 866-521-3595 ext. 2 |
|
Details |
by David Ganje
WATER SYSTEMS SECURITY
INTRODUCTION……………………………………………………………………………………………………….. 1
BRIEF HISTORICAL OVERVIEW……………………………………………………………………………… 1
WATER SECURITY……………………………………………………………………………………………………. 2
- Physical Security ………………………………………………………………………………………….. 3
- i. Milwaukee & Cryptosporidium…………………………………………………………….. 4
- ii. WaterWorks: Physcial Security…………………………………………………………….. 6
- Cyber-Security………………………………………………………………………………………………. 9
- i. WaterWorks: Cyber-Security………………………………………………………………… 11
RECOMMENDATIONS FOR ENHANCED SECURITY………………………………………………. 12
VIRTUAL ATTACHMENT:
Ass’n of State Water Admins., Security Vulnerability Self-Assessment Guide for Small Drinking Water Systems, Nat’l Rural Water Ass’n (May 30, 2002), available at http://www.epa.gov/ogwdw/dwa/pdfs/vulnerability.pdf.
Presentation to the Illinois Chapter of the American Water Works Association.
© 2014. All Rights Reserved. David L. Ganje.
I. Introduction
This article discusses current security issues surrounding water treatment and waste facilities. The sources of attack are myriad, but manifest via physical attacks and cyber-attacks. A physical attack on a water treatment and waste facility occurs when an individual or group causes physical damage to the facilities, structures infrastructure, systems, or the water itself on site. A cyber-attack occurs remotely and disrupts the computer systems that control the treatment and waste facility. Whether the attack be physical, cyber, or some combination, the goal is the same: to harm, even kill, the local population and cause panic. This article will give a brief historical overview of American water systems, discuss the current water security concerns of both physical and cyber-security, and make some practical recommendations for enhanced security.