Electricity Infrastructure Technical Security

Author(s):  
Martin Hromada ◽  
David Rehak ◽  
Neil Walker

In general, energy infrastructure is a basic but very complex system of elements, interconnections, functional inputs and outputs, which creates the need to break down subsystems, systems, and infrastructure areas. The aim of this chapter is therefore to discuss the possible implementation of approaches to risk assessment and risk management in relation to the application of technical security measures. This chapter of the book will therefore discuss risk analysis methods where the transition from general approaches to risk analysis, through risk identification methods and procedures and the assessment of major industrial and technological risks, to specific risk analysis methodologies for electricity infrastructures, will be presented. An important part of the chapter is also the introduction of practical approaches and methodologies that are accepted as “best practices” in connection with ensuring the technical security of electricity infrastructures.

2018 ◽  
Vol 8 (2) ◽  
pp. 54-62 ◽  
Author(s):  
Bashir Muhammad ◽  
Sher Khan ◽  
Yunhong Xu

This study examines how risk management practices can be influenced by factors, including understanding risk management, risk assessment & analysis, risk identification, risk monitoring and credit risk analysis in commercial banks of Pakistan. The collected data satisfied the reliability requirement and regression and correlation analyses were adopted. The results suggest that understanding risk and risk management (URM), risk assessment and analysis (RAA), risk identification (RI), risk monitoring (RM) and credit risk analysis (CRA) have positive significant impact on risk management practices (RMP). This suggests that commercial banks in Pakistan need to pay attention to URM, RAA, RI, RM and RA. Moreover, RM and RAA are prominent variables which influence RMP; therefore commercial banks of Pakistan should focus on RM and RAA


2021 ◽  
Vol 120 ◽  
pp. 02013
Author(s):  
Petya Biolcheva

In recent years, there has been increasing talk of the rapid entry of artificial intelligence into risk management. All the benefits it would bring over the whole process are often commented on: real-time results, processing large amounts of data, more complete risk identification, more accurate risk assessment, etc. There are also negative moods that make various experts feel threatened by their need to be replaced by artificial intelligence. Another problematic issue that arises is related to the transparency of algorithms and the increase in cyber risks [6]. This material aims to identify the individual elements at the stages of risk management in which artificial intelligence (AI) can and should be applied alone, in combination with expert opinion or not. Here it is shown that because of the use of AI the efficiency of the whole process is significantly increased, first of all by conducting in-depth analyses, and the decisions are made by the risk management experts. This proves its usefulness and increases the confidence of experts in it.


2013 ◽  
Vol 739 ◽  
pp. 673-677
Author(s):  
Guo Ping Cheng ◽  
Di Tang ◽  
Bei Bei Liu

Based on the study of basic risk identification method, this paper analyzes domestic factoring risk identification methods and puts forward the basic model based on business process of domestic factoring risk identification, then provides the new ideas for risk identification, the paper lays the foundation to domestic factoring risk evaluation and control system, so it is good to construct a complete, standard domestic factoring risk management system.


2011 ◽  
pp. 234-248
Author(s):  
Enid Mumford

Participative systems design has, in the past, been seen as a positive group process of thinking through needs and problems and arriving at solutions for making the situation better. This improved situation then continues until new technology or new solutions provide an opportunity for making the situation better still. So far this book has concentrated on how to make the best use of the positive factors assisting change, especially change that involves the introduction and use of technology. It has described the importance of getting a clear understanding of the change problem and its complexity, of developing effective strategies to address this complexity, and of the creation of structures, often organizational, to facilitate the subsequent use of the new system. This last requires always keeping in mind the need to meet the dual objectives of achieving operating efficiency and a good quality of working life. This is often described as job satisfaction. Most of all there has been a continual stress on the importance of participation. This involves sharing the design tasks with those who will be affected by them and taking account of their opinions in design decisions. This chapter addresses the reverse of this positive objective. It considers the negative factors in a change situation which are likely to cause problems and to threaten the success of the change programme and of the new system. There are very many of these kinds of problems and it is only possible to discuss a few here. The ones I have selected are criminal threats which affect the future viability of the company, technical problems which reduce efficiency, unpleasant and stressful work that threatens employee health, and problems of morale which affect the individual’s happiness in the workplace. A consideration of negative factors brings us into the challenging areas of uncertainty and risk. Uncertainty is when we do not know what is going to happen and often contains an element of surprise. This is especially true today when so many decisions depend on forecasts of the future. A contributing factor here can be an overemphasis on the present as a means of forecasting the future. Uncertainty is also often a result of the behaviour of others rather than of events. This is hard to predict. Experts tell us that today we are living in a risk society (Beck, 1992). Complex design problems can have a high degree of uncertainty and easily become risks. They often have a subjective element, for what one person considers a problem or a risk, another will see as an opportunity. Complex problems also require information for their solution and this may be difficult to find. It requires the ability to search for, analyse and synthesise, relevant intelligence and relate it to past, current and future events. Threats to important institutions from terrorists are of a different nature and scale to those that have been experienced before. Many will take us completely by surprise. Bernstein (1996) suggests that the essence of risk management lies in maximising the areas which we have some control over while minimising those areas where we have no control over the outcome and the linkage between cause and effect is hidden. When we take a risk we are making a bet that a particular outcome will result from the decision we have made although we have no certainty that this will happen. Risk management usually starts with risk analysis, which attempts to establish and rank the most serious risks to be avoided so far as these are known. Here many companies attempt to achieve a balance between the benefits of greater security and the costs involved. Too high a level of security, while providing good protection, can result in a system that is both difficult to use and expensive to operate (Mumford, 1999). Risk analysis next moves on to risk assessment. This is an analysis of the seriousness of different risks by determining the probability and potential damage of each one. For example, major risks can come from a large concentration of data in one place that is accessed by many different people, not all of whom are known. There can be relationships between risks. Clifford Stoll’s (1990) book The Cuckoo’s Egg shows how the ability of a German hacker to enter a university laboratory computer made it possible for him to later enter into the computers of United States military bases. Risk analysis identifies the risks; risk assessment tries to estimate how likely they are to happen and how serious the consequences will be. Risk priorisation recognises that all companies cannot be protected from all risks and choices must be made. Risk impact is the likely magnitude of the loss if a system break-in, fraud or other serious problem occurs. Risk control involves further actions to reduce the risk and to trigger further defensive actions if a very serious problem occurs. Risk control also covers the monitoring of risk on a regular basis to check that existing protection is still effective. This can lead to risk reassessment. Very serious risks such as those coming from terrorist attack or criminal activity require monitoring. This, together with the detailed documentation of any problems or illegal activities when they occur, is essential to avoid complacency. An effective system must both prevent problems and detect when they have occurred. All of these activities to design security into a system require human vigilance if they are to be effective. All employees should accept some responsibility for checking that the system they work with continues to maintain its integrity and security. This chapter will place its main focus on protective problem solving and design directed at avoiding or minimising very serious risks. Today, it is unwise for managers to neglect this. Because of its growth in recent years and its prevalence today criminal activity will be examined first in some detail. Particular attention will be paid to how the involvement of employees in problem solving can play a part in reducing or avoiding this.


Author(s):  
Karolina Jagiello ◽  
Anita Sosnowska ◽  
Alicja Mikolajczyk ◽  
Tomasz Puzyn

This article gives a brief description of the existing regulations related to biomaterials safety that need to be considered before it is introduced into EU market. According to these regulations, the risk analysis should include two characteristics: probability of occurrence of harm, and severity. Identified user-related harm should be reduced by managing the risk. Additionally, the review presents an overview of engineered biomaterials (EBMs), which in combination with nanoscale components (NPs) have shown promises in Advanced Therapy Medicinal Products (ATMP) and Medical Devices (MD). In this article, recent challenges, objectives and perspectives in risk assessment and risk management of ATMP and MD composed of nanobiomaterials were also highlighted.


2019 ◽  
Vol 20 (3) ◽  
pp. 226-248 ◽  
Author(s):  
Thomas Michael Brunner-Kirchmair ◽  
Melanie Wiener

Purpose Inspired by new findings on and perceptions of risk governance, such as the necessity of taking a broader perspective in coping with risks in companies and working together in interactive groups with various stakeholders to deal with complex risks in the modern world, the purpose of this paper is looking for new ways to deal with financial risks. Current methods dealing with those risks are confronted with the problems of being primarily based on past data and experience, neglecting the need for objectivity, focusing on the short-term future and disregarding the interconnectedness of different financial risk categories. Design/methodology/approach A literature review of risk governance, financial risk management and open foresight was executed to conceptualize solutions to the mentioned-above problems. Findings Collaborative financial risk assessment (CFRA) is a promising approach in financial risk governance with respect to overcoming said problems. It is a method of risk identification and assessment, which combines aspects of “open foresight” and the financial risk management and governance literature. CFRA is characterized as bringing together members of different companies in trying to detect weak signals and trends to gain knowledge about the future, which helps companies to reduce financial risks and increase the chance of gaining economic value. By overcoming organizational boundaries, individual companies may gain the knowledge they would probably not have without CFRA and achieve a competitive advantage. Research limitations/implications A conceptual paper like the one at hand wants empirical proof. Therefore, the authors developed a research agenda in the form of five propositions for further research. Originality/value This paper discusses the existing problems of financial risk identification and assessment methods. It contributes to the existing literature by proposing CFRA as a solution to those problems and adding a new perspective to financial risk governance.


Author(s):  
Robert F. Mills ◽  
Gilbert L. Peterson ◽  
Michael R. Grimaila

The purpose of this chapter is to introduce the insider threat and discuss methods for preventing, detecting, and responding to the threat. Trusted insiders present one of the most significant risks to an organization. They possess elevated privileges when compared to external users, have knowledge about technical and non-technical control measures, and potentially can bypass security measures designed to prevent, detect, or react to unauthorized access. In this chapter, we define the insider threat and summarize various case studies of insider attacks in order to highlight the severity of the problem. We then discuss best practices for preventing, detecting, and mitigating insider attacks, to include application of risk management principles specific to the insider threat. Finally, we provide a survey of ongoing research into detecting irregular activities that are potentially harmful to an organization.


2019 ◽  
Vol 10 (3) ◽  
pp. 144
Author(s):  
Erlane K Ghani ◽  
Nor Hamimah Nor Hassin ◽  
Kamaruzzaman Muhammad

Purpose: This study examines the effect of employees’ understanding of risk management process on knowledge on risk management in a non-profit organisation. Specifically, this study examines the effect of employees’ understanding of risk identification, risk assessment and analysis and, risk control and monitoring on their knowledge on risk management.Design/Methodology/Approach: This study used questionnaire survey on 80 employees of various levels in a non-profit organisation.Findings: This study shows that the most of the employees felt that they have a poor knowledge on risk management. The poor knowledge on risk management is attributed by the all three determinants in this study namely, understanding risk identification, risk assessment and analysis and, risk control and monitoring process on knowledge on risk management.Practical Implications: The findings provide indication that non-profit organisations need to provide awareness programs to their employees in increasing their knowledge on risk management. The findings of this study is essential to the managements to ensure that their employees are well informed and understand risk management and subsequently, take necessary control to reduce risks.Originality/Value: This study provides further understanding on the importance of understanding risk management process on performance.


2018 ◽  
Vol 10 (9) ◽  
pp. 3239 ◽  
Author(s):  
Di Liu ◽  
Xiaoying Liang ◽  
Hai Chen ◽  
Hang Zhang ◽  
Nanzhao Mao

As a tool that can effectively support ecosystem management, ecological risk assessment is closely related to the sustainable development of ecosystems and human well-being and has become an active area of research in ecology, geography and other disciplines. Taking Dujiashi Gully for the study of gully loess erosion, a comprehensive risk assessment system for identifying risk probability, sensitivity and impairment was established. The spatial distribution of comprehensive ecological risk was analyzed, the ecological risk management categories were simultaneously delineated based on the risk dominant factor and the risk management strategies were formulated in loess regions. The results were as follows: (1) the spatial differences in comprehensive ecological risk were significantly different in the research area. The regions with extremely high and high risk were mainly located in gully areas and secondary erosion gullies, which are in 28.02% of study area. The extremely low-risk areas covered 1/3 of the study area and were mainly distributed to the northwest and south of the study area, where hills are widely spaced. (2) The combined analysis of ecological risk and terrain found that the elevation decreased first and then rose but the comprehensive ecological risk increased first and then decreased from north to south. Comprehensive ecological risk and terrain generally showed an inverse relationship. (3) The study area was divided into four types of risk management categories. Risk monitoring zones, habitat recovery zones, monitoring and recovery zones and natural regulation zones encompass 14.84%, 12.44%, 26.47% and 46.25% of the study area, respectively. According to four types of risk management categories, different risk reduction measures were designed to improve regional sustainable development capacity. Risk identification and risk management categories based on comprehensive ecological risk model can design a sustainable development path for social ecosystem and local farmers and provide a method for sustainable development for similar gully landscapes.


Sign in / Sign up

Export Citation Format

Share Document