Mission Critical Operations Primer
eBook - ePub

Mission Critical Operations Primer

  1. English
  2. ePUB (mobile friendly)
  3. Available on iOS & Android
eBook - ePub

Mission Critical Operations Primer

Book details
Book preview
Table of contents
Citations

About This Book

This book is an excellent reference and learning tool for students in entry-level programs and those beginning their careers in mission critical operations. It addresses the core principles of mission critical operations, including: ā€¢The key concepts of mission critical operationsā€¢Standards and regulations relating to mission critical organizationsoMission critical system technologiesoMission critical operations activitiesoSafety and physical security in mission critical organizationsoRisk management methodologies, to understand and address riskoEmergency response preparation and execution

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Mission Critical Operations Primer by Steve Mustard in PDF and/or ePUB format, as well as other popular books in Technology & Engineering & Civil Engineering. We have over one million books available in our catalogue for you to explore.
1
Introduction
The term mission critical applies to any activity, system, or equipment whose failure can result in the disruption of an organizationā€™s operations. Depending on the organization involved, the consequences of failure can be very wide-ranging.
At one extreme, the failure of an online vendorā€™s website can result in a loss of sales. While this could be disastrous to the business concerned, the impact is limited in scope and recovery may not be difficult. Most of us have experienced problems accessing Amazon, Facebook, or Twitter, for instance. While these outages may make the news and can result in a significant financial impact for the business concerned, operations are normally returned promptly and there are few, if any, lasting consequences.
At the other extreme, the failure of control systems in a petrochemical operation could result in injury and loss of life to personnel and the public, as well as harm to the environment from which recovery may be extremely time-consuming, expensive, and difficult. Consider, for example, the Deepwater Horizon accident in 2010. Eleven people lost their lives on the day of the accident, which resulted in the largest oil spill ever in U.S. waters. The negative impact to the environment is still being experienced in the Gulf region of the United States and will be for many years to come. As of 2017, the costs arising from the accident, including financial settlements and fines, exceeds $62 billion.
Mission critical operations can be impacted by a wide variety of factors: hardware or software failures, network communications problems, accidental damage or disruption, or natural disasters. One factor making the news regularly is cyber attack. High-profile incidents have impacted household names such as Sony, Target, eBay, P.F. Changā€™s, and Dominoā€™s Pizza. In these cases, confidential information was stolen, resulting in the need for major disaster-recovery activities. On Christmas Day 2014, a group known as the Lizard Squad successfully brought down the Xbox Live and PlayStation networks. As a result, 48 million Xbox Live subscribers and 110 million PlayStation users were unable to access their respective networks, causing major disruptions on one of the yearā€™s biggest days of demand.
In the industrial space, reports indicate a 10-fold increase in the number of successful cyber attacks on infrastructure control systems since 2000. This is partly a consequence of advances in control systems, enabling them to be integrated into the business environment. Although this has proven to be a huge benefit for businesses, allowing better visibility of process information in near real-time, the increased connectivity has exposed new vulnerabilities that can be targeted by attackers. The connection between industrial (or operational technologyā€”OT) and information technology (IT) systems has created problems for both types of systems. For instance, in Germany in December 2014, a steel mill was attacked and the blast furnace suffered major damage. The origin of the attack was the business network, where the attackers were able to navigate to the control system network and disrupt the emergency shutdown systems that were designed to prevent major damage to the plant.
There are many potential cyber attackers, such as hackers seeking to prove their capabilities, criminals seeking access to financial gain, and state-funded operations designed to damage another stateā€™s activities. As a result, mission critical systems must be designed and operated to cope with accidental and deliberate incidents. In addition, the management of such systems requires an enhanced level of diligence, as the nature and source of threats is always changing.
A whole culture of mission critical operations specialists has emerged. These specialists understand the threats, risks, and consequences of failure. Although they may focus on areas such as robust IT network design, control system security, control room operations, and alarm handling, these specialists will normally have a broad understanding of all key aspects of mission critical systems. No other career requires so many different aspects to be brought together in one role.
About This Book
This book is a primer on mission critical operations. The objective of the book is to provide a high-level overview of key concepts. There are many aspects to mission critical operations and each one can be studied in further depth. It is not the authorā€™s intent to repeat the detail already provided in other books, a list is provided for further reading.
Intended Audience
This book is intended for those who need a high-level understanding of the key concepts in mission critical operations, including students on entry-level programs and those beginning their careers.
2
Mission Critical Operations Concepts
Critical Infrastructure
Modern society is dependent on the underlying critical infrastructure that provides power, water, waste disposal, transportation, financial services, and emergency services. Mission critical operations are essential to the smooth and continued availability of these services.
Technology plays a major role in modern mission critical operations management. There are two distinct forms of technology that exist in mission critical organizations:
ā€¢Information technology (IT) ā€“ This includes computing equipment and systems, networking equipment and systems, and associated processes required to manage a typical business. Most mission critical organizations will have an IT function or department that is responsible for the technology and processes.
ā€¢Operational (or operations) technology (OT) ā€“ This includes the systems, devices, and associated processes that are required to manage physical processes and plants, such as control valves, engines, conveyors, and other machines. In general, OT is the responsibility of an engineering function or department.
Availability, Integrity, and Confidentiality
Management of IT and OT involves many similar aspects, but there are some crucial differences. One fundamental difference is the relative importance of the following factors, as shown in Figure 2-1:
ā€¢Availability ā€“ Making sure the system or information is there when it is needed.
ā€¢Integrity ā€“ Making sure the system is operating correctly or that information is complete and not corrupted.
99836.webp
Figure 2-1. Availability, Integrity, and Confidentiality
ā€¢Confidentiality ā€“ Protecting information from falling into the wrong hands.
All three aspects are important in OT and IT systems, but the relative importance of each varies depending on the type of system.
OT is responsible for monitoring and controlling industrial processes; and failure could have a significant impact on safety, production, and the environment. For OT, the relative order of importance is:
ā€¢Availability
ā€¢Integrity
ā€¢Confidentiality
In other words, OT places priority on the continuous and accurate operations of systems rather than securing confidential information. However, a breach of confidentiality can indirectly lead to loss of availability and integrity. In addition, access to OT systems could provide access to proprietary information, such as details of a novel manufacturing process or product recipe or contents.
For IT, the relative order of importance is:
ā€¢Confidentiality
ā€¢Integrity
ā€¢Availability
In other words, IT plac...

Table of contents

  1. Cover
  2. Title
  3. Copyright
  4. Dedication
  5. Contents
  6. About the Authors
  7. Acknowledgments
  8. Chapter 1: Introduction
  9. Chapter 2: Mission Critical Operations Concepts
  10. Chapter 3: Mission Critical Standards
  11. Chapter 4: Mission Critical Technology
  12. Chapter 5: Operations
  13. Chapter 6: Safety and Physical Security
  14. Chapter 7: Fundamentals of Risk Management
  15. Chapter 8: Continuity of Operations and Emergency Response
  16. Appendix A: Answers to Review Questions
  17. Bibliography
  18. Index