Term Paper on "Security - Agip Kazakhstan North Caspian Operating"

Term Paper 35 pages (14948 words) Sources: 1+

[EXCERPT] . . . .

Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)

Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production Sharing Agreement (PSA), which controls the development of 11 blocks in the Kazakhstan sector of the Caspian Sea. This region contains the giant field of Kashagan, the largest oilfield identified in the North Caspian Sea PSA contract area and widely considered to be the most important new oil discovery of the last thirty years worldwide. Agip KCO, a company fully owned by Eni S.p.A., operates on behalf of a consortium of seven international oil companies, including ConocoPhillips, Eni, ExxonMobil, INPEX, KazMunayGas, Shell and Total.

Agip KCO is committed to working towards the security and protection of its physical, reputational and human assets. In keeping with this policy objective the company wishes to operate a fully integrated electronic/physical/human/procedural security system which will encompass all company locations in Kazakhstan and be monitored from a central operations control centre called SOCC (Strategic Operations Control Centre).

The papers aims at describing the planning, development and implementation of a multi-functional system that will allow Agip KCO to build up an integrated Telecommunication, Security, HSE-ER (Emergency Response), POB (People on Board) and relevant it infrastructure, at each location covering the following aspects:

Automated Tracking System

Vessel Tracking Systems

Integrated AgipKCO-wide Access Control System and Video-surveillance


Continue scrolling to

download full paper
>

Radio communication

This Project is envisaged as a future company wide multi-user system providing benefits to a range of user departments beyond merely the security role.

Chapter 1

1.1 Introduction

The first phase of the AKCO (Agip KCO) Kashagan field development, the Experimental Program (EP) is currently in construction and execution. This consists of the following:

14 production wells injection wells

The combined production capacity of these wells is up to 300,000 barrels of crude oil per day. The future plans for Agip KCO are quite phenomenal

The EP phase will be substituted by a Full Field Development (FFD) program,

This program will utilize the lessons learned from EP to expand production to 1.5 million barrels per day (MMBPD).

Furthermore the production will be acquired from more than 200 wells.

However, it is noteworthy that FFD is currently in the design phase, and construction is planned to begin after first oil from the EP project is delivered in 2010.

Figure 1 - Kashagan Timeline

At the present time, all phases of the Kashagan development are in progress:

The EP phase is under construction;

FFD is under design; and the Operations phase is currently in the planning stage.

This phase will eventually take over the EP program after construction and start-up is complete.

The Kashagan project is widely considered to be the most complex oil field development in history, primarily because of 2 reasons.

The oil extracted from Kashagan wells is extremely toxic, with a high concentration of lethal hydrogen sulfide (H2S) in the extracted natural gas.

Reservoir pressures range from 700-800 bar, requiring state-of-the-art compressors, which will re-inject sour gas (high concentration H2S) to dispose of H2S, increase oil recovery, and maintain pressure in the reservoir.

To minimize the impact of this complexity, AKCO puts a lot of emphasis on ensuring a secure business environment during the Project Construction Phase up to First Oil, by protecting people, assets and information. This will allow AKCO to achieve the following:

Its business goals;

Taking care of the security and safety of its employees;

Demonstrating social responsibilities; and Assisting in minimizing impact on the unique natural environment AKCO operates in.

The Safety, Crisis and Emergency Response Management procedures are currently under development. Complementing those developments, this security feasibility study analyzed the potential benefits offered by the development of advanced technology security services, including a central security platform for the SOCC. The study, in addition, took into account how other divisions' developments could be re-utilized or complemented through the technology developments for security.

1.2 Background of the study

Joel (2003) in his study point out that companies, today, are more and more dependent on information to make critical business decision. This information is usually stored electronically in computers or company servers. Critical business decisions are made by those at the top end of the workforce hierarchy, who have access to these computers and servers. Corporate profitability, human resource development, asset security are some of areas, which come under the scrutiny before making decisions. This positions the information gateway as the most critical and important asset for the company. A good corporate security policy, therefore, should include protocols to secure this information from both internal and external sources. Joel (2003) writes, security policy establishes what must be done to protect information stored on computers. A well-written policy contains sufficient definition of "what" to do so that the "how" can be identified and measured or evaluated. An effective security policy also protects people. Anyone who makes decisions or takes action in a situation where information is a risk incurs personal risk as well. A security policy allows people to take necessary actions without fear of reprisal. Security policy compels the safeguarding of information, while it eliminates, or at least reduces, personal liability for employees."

Even a basic information security policy should include a comprehensively-written plan of action, which clearly illustrates the priorities of the company when it comes to security. A comprehensively-written plan of action with regards to information security should, at least, include the following in order to not only react but also recover from most risky situations in the minimal possible timeframe:

Risk Assessments

Password Policies

Administrative Responsibilities

User Responsibilities

E-mail Policies

Internet Policies

Disaster Recovery (Backup and Restore)

Intrusion Detection (both physical and virtual) (Joel, 2003)

1.3 Research questions of this study

The core research question of this thesis is as follows:

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the security policy of the company?

Additional sub-questions are as follows:

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill personal security?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the physical security of company assets?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the information security?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the aims of corporate governance?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill fraud deterrence

How can advanced technology security services, including a central security platform for the SOCC be used to manage risk properly?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the business continuity planning?

How can advanced technology security services, including a central security platform for the SOCC be used to manage crisis effectively?

How can advanced technology security services, including a central security platform for the SOCC be used to fulfill the company policies regarding environment, safety and health?

1.4 Justification of the research

To justify the research on television sponsorship, a few areas are looked at namely current sponsorship research, importance of television sponsorship, corporate sponsorship, neglect of the specific research problem by previous researchers, and usefulness of potential application of research's finding. First, a brief introduction as to why current sponsorship research is lacking.

Chaiw (2001) in his study points out that simply by protecting the information on computers, companies cannot assume that they are safe. The treats of the 21st century go well beyond hacking and stealing vital information. He writes, "Organizations face security threats from a wide range of sources and are vulnerable to attacks such as computer viruses, hacking and denial of service attacks. Information security by technical means is not sufficient and needs to be supported by policies and procedures (Chaiw, 2001)."

He explains his aforementioned point as follows, "Security policies are the foundation and the bottom line of information security in an organization. A well written and implemented policy contains sufficient information on what must be done to protect information and people in the organization. Security policies also establish computer usage guidelines for staff in the course of their job duties (Chaiw, 2001). System administrators and business owners have to acknowledge the fact that security threats exist and how to prevent and respond to them. Identifying and implementing suitable controls requires careful planning and participation of all employees in the organization is also vital for the success of information security management. Therefore, depending on the company's size, financial resources, and the degree of threat, we have to set up a security policy that finds the right balance between the overreacting and the vulnerable of exposing your system to any and every hack. The objective of a well written and implemented security policy is improved information availability, integrity and confidentiality, from both inside and outside the organization (Chaiw, 2001)."

Similarly,… READ MORE

Quoted Instructions for "Security - Agip Kazakhstan North Caspian Operating" Assignment:

Specific guidelines:

My name is Angelo and I am an Italian security professional who has been

attending a distance learning postgraduate diploma course with a prestigious

UK University. On last month of April I delivered my Diploma Project

(8,000words)which failed for various reasons, as better detailed in the

"marker's comments" document I will email you.

I have been offered the possibility to rework my dissertation according to the

notes I received and go for a second (and last) re-submission.

Unfortunately, I did not manage to dedicate much time to this and am now stuck

in a cul-de-sac with a red light flashing

deadline. I don't think I actually need to write a lot, but rather shape my

"business" language and approach to a more appropriate academic

form. The main aim of the subject is to demonstrate that security can become a

major player in a complex and challenging scenario

(off-shore oil & gas industry) by structuring, staffing and implementing an

electronic platform for emergency response and crisis management.

I collected all information through my direct experience with the project

itself(having been the local expat security manager for five years) and by

interviewing (via email) the persons in charge.

I actually met loads of formal and "confidentiality" obstacles caused by the

former employer which eventually denied access to a number of

important information. The result is a more or less credible patchwork of

different levels data which I am afraid are far

from appearing "academic". Your support would therefore go in the direction of

clothing these 30 pages making them look like a

University outcome rather than a business case report. I hope I made myself

clear enough, but please do not hesitate to come

back with more queries: I need to carry this out, no matter what.

Best wishes,

Angelo

How to Reference "Security - Agip Kazakhstan North Caspian Operating" Term Paper in a Bibliography

Security - Agip Kazakhstan North Caspian Operating.” A1-TermPaper.com, 2008, https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329. Accessed 29 Jun 2024.

Security - Agip Kazakhstan North Caspian Operating (2008). Retrieved from https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329
A1-TermPaper.com. (2008). Security - Agip Kazakhstan North Caspian Operating. [online] Available at: https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329 [Accessed 29 Jun, 2024].
”Security - Agip Kazakhstan North Caspian Operating” 2008. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329.
”Security - Agip Kazakhstan North Caspian Operating” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329.
[1] ”Security - Agip Kazakhstan North Caspian Operating”, A1-TermPaper.com, 2008. [Online]. Available: https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329. [Accessed: 29-Jun-2024].
1. Security - Agip Kazakhstan North Caspian Operating [Internet]. A1-TermPaper.com. 2008 [cited 29 June 2024]. Available from: https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329
1. Security - Agip Kazakhstan North Caspian Operating. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/security-agip-kazakhstan-north/48329. Published 2008. Accessed June 29, 2024.

Related Term Papers:

North Korea Amid Famine in 2000 Essay

Paper Icon

North Korea

Amid famine in 2000, North Korean dictator for life Kim Jong-Il bought a brewery in England, had it dismantled it and shipped it to Pyongyang so the North… read more

Essay 5 pages (1329 words) Sources: 4 Style: APA Topic: Asian History / Asia


Operating System Discuss the Relative Advantages Term Paper

Paper Icon

Operating System

Discuss the relative advantages and disadvantages of at least three different measures used to protect operating systems

There is a great increase in the need for protection with… read more

Term Paper 10 pages (3006 words) Sources: 10 Topic: Computers / IT / Internet


Security Issues of Cloud Computing Data Analysis Chapter

Paper Icon

Security Issues in Cloud Computing

The name Cloud computing was coined from the drawings oftentimes employed to illustrate the internet. Cloud computing is an innovative consumption and new delivery approach… read more

Data Analysis Chapter 5 pages (1450 words) Sources: 5 Topic: Computers / IT / Internet


Security Policy Term Paper

Paper Icon

Security Policy

IT Security Policy

The following security policy defines how strategic it resources and technologies are aligned to supporting organizational objectives and goals. Implicit in this security policy is… read more

Term Paper 4 pages (1080 words) Sources: 4 Topic: Computers / IT / Internet


North Korea Due to Its Relative Geographic Essay

Paper Icon

North Korea

Due to its relative geographic and political isolation, North Korea remains of the most interesting and least understood countries in the world. Nicknamed the "Hermit Kingdom" for its… read more

Essay 8 pages (2724 words) Sources: 8 Topic: Asian History / Asia


Sat, Jun 29, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!