Preparedness of critical infrastructure subjects in energy sector for crisis situations

Author(s):  
A Oulehlova ◽  
H Malachova ◽  
O Svoboda ◽  
J Urbanek
2014 ◽  
Vol 4 (3) ◽  
pp. 11-26
Author(s):  
John S. Hurley ◽  
H. Mark McGibbon ◽  
Roxanne Everetts

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.


Author(s):  
Kinga Smoleń

<p>Celem poznawczym niniejszego artykułu jest analiza problemu cyberataków na infrastrukturę krytyczną państwa w sektorze energetycznym. W ramach case study zaprezentowano przypadek Turcji. Państwo to ze względu na odgrywanie roli „korytarza tranzytowego” dla transportu węglowodorów posiada silną pozycją na międzynarodowym rynku surowców energetycznych, przez co cyberataki dokonywane na infrastrukturę krytyczną Turcji mają poważne konsekwencje nie tylko dla rozwoju tego państwa oraz jego bezpieczeństwa, lecz także układu geopolitycznego w regionie Bliskiego Wschodu i rozkładu sił na – wspomnianym powyżej – międzynarodowym rynku węglowodorów. Dla potrzeb podjętego problemu przyjęto następujące założenia badawcze. Po pierwsze, cyberprzestrzeń stanowi potencjalne źródło zagrożeń dla bezpieczeństwa państwa. Dzieje się tak, gdyż jest to rodzaj „przestrzeni”, która „wymyka się” spod kontroli państwowych organów bezpieczeństwa. Zwiększa to prawdopodobieństwo cyberataków, m.in. na infrastrukturę krytyczną państwa. Po drugie, w warunkach cyberprzestrzeni dochodzi do zmiany ważności komponentów siły w stosunkach międzynarodowych. Wzrost skali i liczby cyberataków potwierdza, że o pozycji państwa i możliwości wywierania przez nie wpływu na system międzynarodowy decyduje obecnie skuteczna zdolność obrony przed atakami w cyberprzestrzeni oraz posiadanie wysoko rozwiniętej technologii informatycznej. Po trzecie, w warunkach procesów globalizacji i odejściu wraz z końcem zimnej wojny od myślenia o bezpieczeństwie z perspektywy zagrożeń wojskowych doszło do poszerzenia jego zakresu podmiotowego i przedmiotowego. Bezpieczeństwo dotyczy obecnie wielu obszarów życia społecznego, zaś źródła jego zagrożeń mają charakter: polityczny, gospodarczy, wojskowy, społeczny, ekologiczny, demograficzny, energetyczny. Tym samym bezpieczeństwo energetyczne stało się jednym z autonomicznych wymiarów w strukturze szeroko pojmowanego bezpieczeństwa.</p>


2015 ◽  
Vol 6 (2) ◽  
pp. 35-66
Author(s):  
Elena A. Iankova ◽  
Atanas G. Tzenev

Foreign direct investment (FDI) by entities controlled by foreign governments (especially state-owned enterprises) is a new global phenomenon that is most often linked to the rise of emerging markets such as China and Russia. Host governments have struggled to properly react to this type of investment activity especially in key strategic sectors and critical infrastructure that ultimately raise questions of national security. Academic research on sovereign investment as a factor contributing to the new global protectionist trend is very limited, and predominantly focused on sovereign investors from China. This study explores the specifics of Russian sovereign investment in the former Soviet Bloc countries, now members of the European Union, especially in strategic sectors such as energy. We use the case of Bulgaria’s nuclear energy sector and the involvement of Russia’s state-owned company Rosatom in the halted Belene nuclear power plant project to analyze the dynamics of policy and politics, political-economic ideologies and historical legacies in the formation of national stances towards Russia as a sovereign investor. Our research contributes to the emerging literature on FDI protectionism and sovereign investment by emphasizing the significance of political-ideological divides and the heritage of the past as determinants of sovereign investment protectionism.


Resources ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 87
Author(s):  
Krzysztof Boryczko ◽  
Janusz Rak

The approaching prospect of obligatory implementation and pursuit of Water Safety Plans forces water companies to reflect on supplies in crisis situations that, for example, relate to the closure of a basic intake, or scarcity of water due to climates changes (droughts). Where supplies are diversified, there can be greater certainty as to the continuity of good quality supply, even in an emergency. As one of each country’s systems of critical infrastructure, the collective water supply system (CWSS) should be protected, with the diversification of supply treated as a basic tool to raise levels of security among consumers. This article, therefore, presents a method from the authors’ by which diversification may be assessed, including by reference to basic and key elements of the CWSS capable of affecting the continuity of water supply. Sample calculations using the proposed method are also presented here for selected Polish cities. In the event, as only one Polish CWSS can be assigned to the category representing excellent diversification, the suggestion is clearly that Poland’s systems must still progress with the diversification of water supply, in order to further reduce the risk of water shortages.


2014 ◽  
Vol 20 (2) ◽  
pp. 312-331 ◽  
Author(s):  
Juozas Augutis ◽  
Benas Jokšas ◽  
Ričardas Krikštolaitis ◽  
Inga Žutautaitė

After the last major accidents in the energy sector of the last decade (USA and Canada (2003), India (2012), Russian-Ukrainian (2009)), energy infrastructure criticality assessment has become one of the most important issues. It has become the topical subject of the economy and national security in all countries. There is no single measure unit for the assessment of critical infrastructure with respect to “interdependency” among critical infrastructure sectors. This paper proposes to use criticality of infrastructure element as a measure to assess the importance of considered element to the normal activity of all sectors of infrastructure. The pilot numerical simulation of heat and electricity infrastructure was performed to demonstrate the implementation of the application of developed method for the assessment of infrastructure functionality and criticality.


2019 ◽  
Vol 25 (1) ◽  
pp. 213-218 ◽  
Author(s):  
Miroslav Vergilov Dimitrov ◽  
Nataliya Venelinova

Abstract The paper presents evidence based brand new approach of the permanent rise of the competences and know-how transfer between researchers, teachers and professionals aiming to ensure the specific expertise of the human resources engaged in energy security management. The approach has a collaborative and integrative nature and relies on the hybridization between energy management, urban development planning, environmental management, civil protection, protection of critical infrastructure and the national security applied fields. The authors redefine the conventional understanding of the energy security by describing a practically oriented integrated approach of teaching energy security, based on 3 separately existing concepts: the concept for smart energy security grid, those for the smart cities and the standard operative procedures applied to energy security management. Smart, Secure and Safe Energy Management (3SEMA) is both behaviorally and technically oriented and presented in a circular chart, involving all actors on certain territory with the purpose to apply smart, secure and safe approach in governing the energy sector, taking into consideration the dynamic technological changes and the concept of intelligent urban use.


2020 ◽  
Vol 2 (10) ◽  
pp. 67-74
Author(s):  
Yanina Roy ◽  
Olena Riabchun ◽  
Valeriy Yermoshin

Currently, a large set of IS maturity assessment models based on similar principles is available for both commercial and government organizations and institutions. At the same time, the actual use of such models is quite limited, primarily due to the weak attachment to the characteristics of specific organizations. This problem is partially solved by adapting existing approaches in the form of industry models (for example, ES-C2M2 for companies in the energy sector, ONG-C2M2 for companies in the oil and gas sector). Moreover, the emergence of a new model is very likely, which includes not only qualitative analysis through a set of characteristics / domains, but also a quantitative assessment of cybersecurity, which will use the assessment for both strategic and operational planning, as well as create an advanced expert analytical system . The best solution today is to start implementing any of the existing evaluation models with further adaptation and expansion for your own needs. Similar principles of model building will allow in the future to migrate painlessly to a more appropriate, while the experience gained in the assessment, as well as statistics will judge the progress of IS processes in the enterprise, and, importantly, in a convenient and understandable for senior management. The ES-C2M2 Cyber ​​Security Maturity Model can significantly help energy sector organizations to assess and improve their cybersecurity areas. The ES-C2M2 Capability Maturity Model is part of the DOE Cybersecurity Capability Maturity Program (C2M2) and was developed to address the unique characteristics of the energy subsector. The opportunity maturity model is a tool for self-assessment to measure and improve their cybersecurity areas. International standards and practices in the field of information security recommend that organizations when planning IS activities to assess the current state of IS and set a target for the near future, the achievement of which will allow the company to effectively address existing threats and respond to new challenges and threats of IS.


Sign in / Sign up

Export Citation Format

Share Document