Response to Peer Post (8)
Response to Peer Post
Author’s Name
Institutional Affiliation
Response to Peer Post
I would like to thank you first for presenting such a wonderful post as it provides a rich picture of vulnerabilities that local power plants can encounter. Specifically, you have identified several vulnerabilities that the Cushman Hydro Project power plant faces, and among these, I find one to be of significant interest to me. This is the vulnerability emanating from the structural integrity of the dam. While you acknowledge that information about this vulnerability was limited, I feel that dams and other plant structures that fail to meet structural integrity standards can generate massive safety vulnerabilities for those working in the plant and the communities around.
Concerning the aspects of the power plant operations that you might seek to exploit, I am a little bit confused when you state that you would seek to exploit the seriousness with which the plant provides essential physical security to its facilities. Perhaps I would need more clarification on what you mean by that point. Finally, I agree that the provision of ongoing training for employees on password management, along with conducting active access control, the inclusion of wireless sensor networks, and physical security monitoring are imperative approaches to augmenting the security posture of this power plant.


