Refinery and Storage Stages in Energy

Refinery and Storage Stages in Energy
Refinery and Storage Stages in Energy

Why Refinery and Storage Stages in Energy are More Vulnerable than at Other Supply Chain Components

Order Instructions:

Read the required literature and especially review the videos.

•Critical Infrastructure Protection Module: Energy Supply Chain: https://www.chds.us/coursefiles/cip/lectures/energy/cip_energy_supplychain/player.html

•Energy Vulnerability Analysis: https://www.chds.us/coursefiles/cip/lectures/energy/cip_energy_vulnerabilityanalysis_p01/player.html

•Critical Infrastructure: Vulnerability Analysis and Protection: SCADA Structure: https://www.chds.us/coursefiles/cip/lectures/scada/cip_SCADA/player.html

•SCADA Vulnerability Analysis:
https://www.chds.us/coursefiles/cip/lectures/scada/cip_SCADA_vulnerabilityanalysis/player.html

Permission granted by Naval Postgraduate School, Center for Homeland Defense and Security, 28 JAN 11.

Answer the following:

1.Why are refinery and storage stages more vulnerable than at other supply chain components?

2.IT-ISAC: Explain what this is and its role in IT and computer products.

3.“SCADA protection is scattered among governmental agencies and commercial groups.” Give some examples of overlap.

Assignment Expectations
Length: This Case Assignment should be at least 3 pages not counting the title page and references.

References: At least two references should be included from academic sources (e.g. peer-reviewed journal articles). Required readings are included. Quoted material should not exceed 10% of the total paper

Organization: Subheadings should be used to organize your paper according to question.

SAMPLE ANSWER

Why Refinery and Storage Stages in Energy are More Vulnerable than at Other Supply Chain Components

Energy markets are known to be very complex, technically challenging and highly competitive. Improving the performance throughout the supply chain and more so at all levels of the operations could be at the top of all the agendas of all suppliers. The economic regulatory and the changing business dynamic pressures are continuously faced by the energy providers. Success can only be achieved in this area if the suppliers have responsive, flexible, and scalable strategies that could deliver the profits to the shareholders and the service and value to the consumers.

According to the National Research Council (NRC) and the US Global Research Program (USGCRP) assessments, it is clear that the US energy infrastructure is more vulnerable to the impacts of the range of climate particularly the infrastructure in areas that are prone to bad weather and shortages of water supply. The climate changes are most projected to affect the infrastructure throughout the stages of the energy supply chain thus increasing the risk of disruption (Andrews, 2008).

However, the key issues that affect the retail energy market include: the security of supply in the short and long term, the unit cost of energy and its increasing competition, simplification of the models of tariffs and setting the standards for billing of customers, the smart meters, the carbon reduction commitments and its effects on the energy bills, the micro generation, reduction and the removal of the fuel poverty, and finally the improvement of the energy efficiency at the level of consumption.

IT-ISAC

IT-SAC is known in full as the Information Technology Services Advisory Committee. It was established in the year 2002 to offer a forum say for the students as well as the IT staff in order to discuss the technology priorities and issues. It involves the membership including the representatives from the college and the members in general in order to discuss the current and the new IT initiatives and is mandated to submit a report each and every year (Basham & Campbell, 2009).

Role of IT-SAC in IT and Computer Products

The Information Technology Services Advisory Committee (ITSAC) is designed so as to advice the Vice Provost of the Information Technology and the CIO on the IT services that are provided to the community of the University by the Information Technology Services. Its deliberations are known to be informed by the advice from the respective administrative units, which have clear accounting for all the advisory committee recommendations and the commentary.

Simply, its primary roles include the making of recommendations on the levels of the services offered to IT and their costs in general. Secondly, is to review the budget involved in the Information Technology Services so as to ensure that the services that are provided to the University are carried out effectively and even more efficiently. Lastly, the IT-SAC is designed also for the purpose to provide advice and the input to the Vice Provost for the Information Technology and the CIO regarding the annual preparation and the presentation of the budget of the Information technology Services to the university Budget Advisory Committee (Shyh Chiuan Chia, 2005).

“SCADA protection is scattered among governmental agencies and commercial groups.”

With the SCADA international, consulting, project solutions and engineering are offered. Aside from that, they involve the execution of the Supervisory Control and data Acquisition (SCADA) systems within the renewable sector of energy. The clear structures and processes guide their work whether with the supply of an off the shelf solution or a project specific solution. They implement the best SCADA solutions to the market, make puzzle to get into place as well as the critical piece involving any good SCADA solution.

The SCADA systems are usually more complex with multiple components. They may be fully automated where there is full control performed by the computers, fully manual in the case where control is performed by the human operators or even a hybrid system. Many SCADA systems include the following in order to perform the above functions: The field Interface Devices which sensors the detecting and the reporting power levels, temperature, pressure, flow rates and the local control devices like the controls of motors, valve actuators and the control switchboxes.

In addition, they involve the operating equipment where the motors, automated factory, pumps and the valve are controlled by the SCADA network. They involve the management computers whereby the computer terminals with a Human machine Interface (HMI) are connected with the SCADA network. These computers have a provision of an interface for the operators to monitor and control the devices on the SCADA network.  Other than that, they involve the interconnection to the business process systems. That is, the SCADA networks frequently are connected to the corporate networks so as to allow them to interconnect with the business process systems (Norman SCADA protection, 2012).

References

Andrews, C. J. (2008). Energy Conversion Goes Local: Implications for Planners. Journal Of The American Planning Association, 74(2), 231-254.

Basham, M. J., & Campbell, D. F. (2009). Introduction to the Special Issue on Best Practices in SACS Accreditation. Community College Journal Of Research & Practice, 33(8), 609-610.

Norman SCADA Protection. (2012). Pipeline & Gas Journal, 239(6), 85.

Shyh Chiuan Chia, C. (2005). Promoting independent learning through language learning and the use of IT. Educational Media International, 42(4), 317-332.

We can write this or a similar paper for you! Simply fill the order form!

Unlike most other websites we deliver what we promise;

  • Our Support Staff are online 24/7
  • Our Writers are available 24/7
  • Most Urgent order is delivered with 6 Hrs
  • 100% Original Assignment Plagiarism report can be sent to you upon request.

GET 15 % DISCOUNT TODAY use the discount code PAPER15 at the order form.

Type of paper Academic level Subject area
Number of pages Paper urgency Cost per page:
 Total: