Maintaining Mission Critical Systems in a 24/7 Environment. Peter M. Curtis

Чтение книги онлайн.

Читать онлайн книгу Maintaining Mission Critical Systems in a 24/7 Environment - Peter M. Curtis страница 33

Автор:
Жанр:
Серия:
Издательство:
Maintaining Mission Critical Systems in a 24/7 Environment - Peter M. Curtis

Скачать книгу

distribution feeders have a limited “hosting” capacity to accept distributed generation. For example, in New York State, if the DG capacity exceeds 50 kW on a single‐phase branch of a radial distribution circuit, or 150 kW on a single distribution feeder, the interconnect applicant may have to pay for a “Coordinated Electric System Interconnection Review.”

      11 The fundamental issue, namely, is that the electric utility is both the supplier of last resort and is responsible for the quality of power (such as it is today) delivered to every metered customer. This means that utilities will endeavor to live up to these responsibilities and design a system robust enough to minimize liabilities due to poor power quality. Therefore, the technical requirements placed upon distributed generation designs will be very stringent in an effort to make such generation units “utility‐grade” in quality.

      Given the technical and institutional realities, there is still much room within which any critical facility owner can design a power supply system that includes at least these three key components: reasonably reliable utility electric service, a reliable and well maintained back‐up power generation system, and distributed energy resource(s) that use high efficiency or renewable energy sources to drive down energy costs while reducing air pollution and greenhouse gas emissions. In certain installations, the distributed energy resource can be engineered to work in concert with the back‐up generation system.

      Fuel cell technology has seen uses in mission critical environments since its inclusion in NASA’s Gemini space missions in the mid‐1960s using hydrogen and oxygen to produce power. Modern fuel cells, which convert natural gas to electricity without combustion, are deployed as a combined heat and power (CHP) system provide reliable, high‐quality power and recoverable waste heat, while reducing the “carbon footprint” of your facility. To make the best use of a fuel cell installation, it should be sized at or below the base load of the data center or other critical facility that it will serve. In areas with reliable grid service, the financial viability of fuel cells is dependent on low natural gas prices, but fuel cells may also be deployed as the primary power source in areas with poor grid reliability due to a lack of utility investment or extreme weather conditions.

      There are also many examples of data centers incorporating photovoltaic technology into their power systems. Due to federal and state subsidies and incentives, PV technology is often a cost‐effective way to “go green,” and lower costs with a return on investment as low as a few years.

      One proposed larger‐scale solution is the use of “virtual power plants,” whereby multiple distributed generation resources are linked together via the Internet so they can be managed as a single entity. This model allows for a mix of resources to work together to negate some of the disadvantages and power quality issues traditionally associated with small energy sources.

       Security Questions:

      1 Have you addressed physical security concerns?

      2 Have all infrastructures been evaluated for the type of security protection needed (e.g., card control, camera recording, key control)?

      3 If remote dial‐in or Internet access is provided to any infrastructure system, have you safeguarded against hacking, or do you permit read‐only functionality?

      4 How frequently do you review and update access permission authorization lists?

      5 Are critical locations included in security inspection rounds?

       Network and Access:

      1 Do you have a secure network between your facility’s IT installations?

      2 Do you have an individual on your IT staff responsible for managing the security infrastructure of your data?

      3 Do you have an online file repository? If so, how is the use of the repository monitored, logged, and audited?

      4 How is data retrieved from the repository and then kept secure once it leaves the repository?

      5 Is your file repository available through the public Internet?

       Techniques for addressing information security:

      1 Enforce strong password management for properly identifying and authenticating users.

      2 Authorize user access to only permit access needed to perform job functions.

      3 Encrypt sensitive data.

      4 Effectively monitor changes on mainframe computers.

      5 Physically identify and protect computer resources.

       Periodic assessments of the risk and magnitude of harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems.

       Policies and procedures that:Are based on risk assessments.Cost‐effectively reduce risks.Ensure that information security is addressed throughout the life cycle of each system.Ensure compliance with applicable requirements.

       Plans for providing adequate information security for networks, facilities, and systems.

       Security awareness training to inform personnel of information security risks and of their responsibilities in complying with agency policies, procedures, and practices, performed.

       A process for planning, implementing, evaluating, and documenting remedial action to address deficiencies in information security policies, procedures, or practices.

       Plans and procedures to ensure continuity of operations for information systems.

Скачать книгу