Technical Resources

This Week in Washington


Search All WEF Access Water Knowledge Centers!

You can narrow your search by selecting one or more of the options below:


To find WEFTEC materials please visit WEFTEC.ORG!


General Security Information

  • Each source on this page has been assigned to an arbitrary group of General (G).
  • The principle focus of the material is noted in the right-most column.  The assignments of the principle focus areas are preliminary; the principle focus areas may also be expanded or contracted.
  • Click on the title to access additional information.


T = Threats A = Awareness
  VA = VA Methodology CM = Countermeasures
M = Management ERP = Emergency Response Planning

Title Principle Focus
Access Control
  Thames Valley Police
Description:  Information on various access control systems, and on effective policies for controlling employee access. Includes information on technology that can restrict employee access to only areas the employee works in.
Resource Number:  G-1
Are You Ready? An In-depth Guide to Citizen Preparedness
Author:  Federal Emergency Management Agency (FEMA)
Description:  FEMA's most comprehensive source on individual, family, and community preparedness. Provides a step-by-step approach to disaster preparedness by walking the reader through how to get informed about local emergency plans, how to identify hazards that affect their local area, and how to develop and maintain an emergency communications plan and disaster supplies kit. Other topics covered include evacuation, emergency public shelters, animals in disaster, and information specific to people with disabilities.
Resource Number:  G-2
Building Security Through Design WEBSITE
Author:  American Institute of Architects
Description:  This special section of the American Institute of Architects (AIA) web site explores how architects, engineers, owners and others can work toward a common goal of safer buildings in this time of heightened security concerns.
Resource Number:  G-3
CM, A, M
Design and Evaluation of Physical Protection Systems (The)
  Mary Lynn Garcia. Sandia National Laboratories. Butterworth-Heinemann. February 2001. ISBN: 0750673672
Description:  The book takes the reader through a description of the overall process of security system design and installation, explaining how the various parts work together to form an effective system. The book is arranged in three major parts according to the procedure of security system design: 1) determine objectives, 2) design the system, and 3) evaluate the system.
Resource Number:  G-4
T, CM, A, M, ERP
DoD Minimum Antiterrorism Standards for Buildings
Author:  US Department of Defense
Description: This document outlines the DoDs antiterrorism standards for buildings. It is intended to minimize casualties in the event of a terrorist attack.
Resource Number:  G-5
T, CM, A, M
Disaster preparedness Planning Guide for Facilities
Author:  Pennsylvania Emergency Management Agency
Description:  This guide is directed to facility managers to provide assistance in protecting employees and clients. It is intentionally generic in nature, so that it may apply to a variety of public buildings.
Resource Number:  G-6
Dynamic Risk Model for Information Technology Security in a Critical Infrastructure Environment (A)
Author:  John H. Saunders
Description:  The risk assessment, modeling, and simulation of critical infrastructure information technology (IT) security has been limited to broad, macro-level approaches. Concurrently, risk assessment in IT security has been limited to static analysis and modeling. This paper provides a dynamic risk framework and a model that synthesizes elements of an organizational decision model on both macro and micro levels. In the proposed dynamic model the focus is upon building the reactionary capability of an infrastructure organization as well as preparing for time-based cascading effects.
Resource Number:  G-7
T, VA, CM, A, M
Emergency Management Guide for Business and Industry - A Step-By-Step Approach To Emergency Planning, Response And Recovery For Companies Of All Sizes
Author:  Federal Emergency Management Agency (FEMA)
Description:  This guide provides step-by step advice on how to create and maintain a comprehensive emergency management program. It can be used by manufacturers, corporate offices, retailers, utilities or any organization where a sizable number of people work or gather. The guide covers: Steps in the Planning Process, Emergency Management Considerations, Hazard-Specific Information, and Information Sources
Resource Number:  G-8
Emergency Prepared Checklist
  Federal Emergency Management Agency (FEMA) 1997
Description:  This checklist contains questions that can help to determine the type of emergency that can occur in the area, how to prepare for an emergency, and what supplies would be needed.
Resource Number:  G-9
Government Emergency Telecommunications Service WEBSITE
Author:  2004
Description:  This web site provides complete information on the use of and access to the GETS telephone system.
Resource Number:  G-10
Guide for All-Hazard Emergency Operations Planning - State and Local Guide 101. Chapter 6 Appendix G
  Federal Emergency Management Agency (FEMA)
Description:  The purpose of Attachment G is to aid state and local emergency planners in developing and maintaining a Terrorist Incident Appendix to an Emergency Operations Plan for incidents involving terrorist-initiated weapons of mass destruction.
Resource Number:  G-11
Infrastructure Security, Dependencies, and Asset Management
Author:  American Society of Civil Engineering,  Author Miriam Heller
Description: Networked infrastructure systems cannot be accurately examined through the narrow lens of a single goal. Intradependencies, i.e., system component interconnectedness, may affect system performance unpredictably, rendering the goal of optimal security elusive. Similarly interconnectedness or interdependencies with other infrastructures such as the power grid can have radical and far-reaching effects on pipeline system performance as well. Asset management provides a framework for decision-making with multiple performance measure under risk. This paper discusses current research to extend the knowledge base on complex infrastructures and strategies, such as asset management, to support these extensions.
Resource Number:  G-12
A, M
Infrastructure Security, Planning in an Unstable World
Author:  AWWA Edition: 2005, Hardback, 94 pp. ISBN 1-58321-252-3; Catalog Number 20541
Description:  This handbook provides guidance to public officials who are charged with assuring the security of city infrastructure. The book covers all areas of security planning and crisis management: potential threats, vulnerability assessment, crisis management, emergency preparedness, disaster planning , emergency response, response team coordination, communications with first responders, news media, and public officials.
Resource Number:  G-13
T, VA, CM, A, M, ERP
Intrusion-Detection Units UL 639 WEBSITE
Author:  Underwriters Laboratory Webste
Description:  This web page lists the UL requirements for intrusion-detection units.
Resource Number:  G-14
LEPCs and Deliberate Releases: Addressing Terrorist Activities in the Local Emergency Plan
Author:  USEPA 550-F-01-005 August
Description:  This document is a guide for local emergency planning committees (LEPCs) and recommends including counter-terrorism measures in their plans.
Resource Number: G-15
T, CM, A, M, ERP
Lessons Learned Information Sharing WEBSITE
Author:  US Department of Homeland Security -Lessons Learned Information Sharing (LLIS)website
Description:  The Lessons Learned Information Sharing is an MIPT- and ODP-sponsored national knowledge base of lessons learned and best practices serving the emergency responder community. Users of the system must be authorized members, however, membership is free. An application can be found on the LLIS website.
Resource Number:  G-16
National Incident Management System
Author:  U.S. Department of Homeland Security March 2004
Description:  Developed by the United States Department of Homeland Security (DHS). This is the Nation's first standardized management plan that creates a unified structure for Federal, state, and local lines of government for incident response.
Resource Number:  G-17
National Memorial Institute for the Prevention of Terrorism. WEBSITE
Author:  MIPT - National Memorial Instsitute for the Prevention of Terrorism
Description:  The MIPT Best Practices/Lessons Learned Knowledge Base (BP/LL) is designed to capture the insights of federal, state, and local officials who have responded to terrorist incidents and have participated in counterterrorism exercises. MIPT believes that sharing this type of information will assist all officials in making more informed decisions regarding the use of their resources to deter, prevent or respond to terrorist incidents. The ultimate goal is to provide, through sharing knowledge, an analytical foundation for future decisions regarding policy, planning, procedures, training, organizational structure and equipment.
Resource Number:  G-18
T, A, M, ERP
New Horizons: Critical Infrastructure Protection
Author:  American Water Works Association. 2001. DVD
Description:  This DVD covers intentional acts of destruction such as physical damage, bioterrorism, chemical contamination, and cyber attack. This source can be used to stimulate discussion among utility managers and community leaders.
Resource Number:  G-19
T, A
Protecting Buildings and Their Occupants from Airborne Hazards
Author:  US Army Corps of Engineers
Description:  This document presents a variety of ways to protect building occupants from airborne hazards -- to prevent, protect against, and reduce the effects of outdoor and indoor releases of hazardous materials. It contains guidance for building managers, designers, and security planners on how to minimize the potential effects of hazardous materials released in accidents, malicious acts, or natural phenomena.
Resource Number:  G-20
T, CM, A, M
Public Health Response to Biological and Chemical Terrorism - Interim Planning Guidance for State Public Health Officials
Author:  U.S. Department of Health and Human Services - Centers for Disease Control and Prevention. July 2001
Description:  This Planning Guidance is designed to help state public health officials determine the roles of their departments in response to biological and chemical terrorism and to understand the emergency response roles of local health departments and the emergency management system. The Planning Guidance also can be used to help state health departments coordinate their efforts with the many agencies and organizations at all levels of government that ultimately would respond to a biological or chemical terrorism event.
Resource Number:  G-21
Recognizing Waterborne Disease And The Health Effects of Water Pollution WEBSITE
  American College of Preventative Medicine
Description:  This guide helps healthcare providers recognize and manage waterborne disease and the health effects of water pollution resulting from natural or intentional contamination of water. The Web site offers free access and 24/7 availability, clinically relevant information, and a repository of physician antiterrorism preparedness resources.
Resource Number:  G-22
Security Planning and Design
  American Institute of Architects
Description:  This reference from the AIA contains information for security planning for both new and existing facilities.
Resource Number:  G-23
Security Planning and Disaster Recovery
Author:  Publisher: McGraw-Hill Osborne Media; 1 edition (May 28, 2002) ISBN: 0072224630
Description:  Proactively implement a successful computer security and disaster recovery plan--before a security breach occurs. Including hands-on security checklists, design maps, and sample plans, this expert resource is crucial for keeping your network safe from any outside intrusions.
Resource Number:  G-24
Structural Design for Physical Security
Author:  American Society of Civil Engineers ASCE 0-7844-0457-7
Description:  This document provides guidance to civil engineers on how to design structures to resist various hostile acts. While the U.S. military services and U.S. foreign embassy facilities both have developed their unique requirements, the documents are restricted to official use only. This Report includes unrestricted government information, which is for the first time assembled collectively and rephrased for application to civilian facilities, and provides complete methods, guidance, and references for structural engineers challenged with a physical security problem.
Resource Number:  G-25
Twenty One Steps to Improve Cyber Security of SCADA Networks
Author:  President's Critical Infrastructure Protection Board, Department of Energy's Office of Energy Assurance
Description:  This document outlines 21 steps to improve cyber security of supervisory control and data acquisition (SCADA) networks. The steps are divided into two categories: specific actions to improve implementation, and actions to establish essential underlying management processes and policies.
Document available from the DOE Office of Energy Assurance
Resource Number:  G-26

Feedback:  Click here to let us know what you think about this resource.