Contingencies and Interfaces
LEW HANES: How are these contingencies handled?
BILL MELTON: The Security Coordinators will evaluate the system interfaces using the first contingencies associated with the interfaces. He/she will then inform all parties involved as to how the case is solved if a problem should actually exist.
If the Security Coordinator runs a study case using the first contingency and cannot solve the case by loading our resources, that's when we get into the process of trying to bring that interface down to a controllable leveLew Hanes: It's more complicated than that, but that's the basis of what happens if the Security Coordinator identifies a potential problem on our system.
They have developed plans and procedures for each individual interface. They know what to do to fix an interface if there's a problem.
LEW HANES: Where are those procedures stored?
BILL MELTON: They are in a book that can be accessed easily.