Security of Water Critical Infrastructure

Author(s):  
David Birkett

There is an identified and elevated threat level to water services by modern terrorists, in consideration of increasing levels of observed violence in recent terrorist attacks across Europe. This chapter raises significant aspects related to the security of the water critical infrastructure (water CI). Initially, dependencies and interdependencies of water CI, with other CIs, are highlighted as a potential incubating risk, which may well be hidden within the complexities of the modern water value chain of logistics and services. Threats to water CI including single points of failure are further described, followed by terrorist water attack planning methodologies and strategies. Finally, the water CI protection that may be considered to reduce any future threat levels from acts of terrorism is discussed.

2014 ◽  
Vol 4 (3) ◽  
pp. 11-26
Author(s):  
John S. Hurley ◽  
H. Mark McGibbon ◽  
Roxanne Everetts

Many of the systems that control the critical infrastructure were not originally designed with security in mind. This has left us vulnerable to unwanted attacks in many of the environments. It has become essential that the authors determine if their infrastructures are better prepared for existing and future threats. In this study, the authors will examine the impact of attacks, including terrorist attacks on critical infrastructures, in particular, the Energy sector. The results show that in spite of the warnings of the threats carried out in various sectors and organizations around the world, they have still remain extremely vulnerable because of a number of critical security issues that hamper their ability to better serve and protect our vital information assets. The authors examine some of the most prominent models being used today and how they may be modified to better serve the needs of their user communities and key stakeholders.


Author(s):  
Harry Hammitt

Since the terrorist attacks of September 11, 2001, there has been a tightening of public access. In response to perceived security threats, government agencies have taken information down from Web sites, curtailed or restricted access to electronic sources of information, broadened the interpretation of FOIA exemptions, created or augmented new categories of restricted information, and prohibited public access for critical infrastructure information. These policy responses have been based both on the perceived security threat and an inhospitable attitude toward open government on the part of the Bush administration.


Author(s):  
Philipp Paulus ◽  
Katrin Muehlfeld

Purpose The purpose of this paper is to analyze the relationship between host country (HC) language skills, fear of terror, and cross-cultural adjustment (CCA) of expatriates based in host countries with different terrorist threat levels. Design/methodology/approach Integrating the expatriate adjustment framework by Black et al. (1991) with social identity theory-based literature, this study first, theorizes about the effects of both fear of terror and HC language proficiency on CCA and, second, puts forward the moderating effect of the actual terrorist threat level on the relationship between HC language proficiency and fear of terror. Hypotheses are tested using survey data of 116 expatriates based in host countries with different threat levels. Findings HC language proficiency is positively associated with CCA. Yet, it is also positively associated with fear of terror, which is, in turn, negatively related to CCA. Consequently, the beneficial effect of HC language skills on CCA is reduced in environments where expatriates experience significant fear of terror. While the actual threat level has a direct positive effect on fear of terror, it also positively moderates the relationship between HC language proficiency and fear of terror. Originality/value This study extends prior literature on expatriation to dangerous environments by zooming in on a specific type of risk factor associated with international assignments, i.e., terrorism, and by integrating HC language proficiency and fear of terror as important factors, which may influence CCA in contexts in which expatriates experience significant fear of terror.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Rachel H. L. Walls ◽  
Nicholas K. Dulvy

AbstractThe loss of biodiversity is increasingly well understood on land, but trajectories of extinction risk remain largely unknown in the ocean. We present regional Red List Indices (RLIs) to track the extinction risk of 119 Northeast Atlantic and 72 Mediterranean shark and ray species primarily threatened by overfishing. We combine two IUCN workshop assessments from 2003/2005 and 2015 with a retrospective backcast assessment for 1980. We incorporate predicted categorisations for Data Deficient species from our previously published research. The percentage of threatened species rose from 1980 to 2015 from 29 to 41% (Northeast Atlantic) and 47 to 65% (Mediterranean Sea). There are as many threatened sharks and rays in Europe as there are threatened birds, but the threat level is nearly six times greater by percentage (41%, n = 56 of 136 vs. 7%, n = 56 of 792). The Northeast Atlantic RLI declined by 8% from 1980 to 2015, while the higher-risk Mediterranean RLI declined by 13%. Larger-bodied, shallow-distributed, slow-growing species and those with range boundaries within the region are more likely to have worsening status in the Northeast Atlantic. Conversely, long-established, severe threat levels obscure any potential relationships between species’ traits and the likelihood of worsening IUCN status in the Mediterranean Sea. These regional RLIs provide the first widespread evidence for increasing trends in regional shark and ray extinction risk and underscore that effective fisheries management is necessary to recover the ecosystem function of these predators.


2007 ◽  
Vol 274 (1612) ◽  
pp. 959-965 ◽  
Author(s):  
Corsin A Müller ◽  
Marta B Manser

Territorial animals typically respond less aggressively to neighbours than to strangers. This ‘dear enemy effect’ has been explained by differing familiarity or by different threat levels posed by neighbours and strangers. In most species, both the familiarity and the threat-level hypotheses predict a stronger response to strangers than to neighbours. In contrast, the threat-level hypothesis predicts a stronger response to neighbours than to strangers in species with intense competition between neighbours and with residents outnumbering strangers, as commonly found in social mammals such as the banded mongoose ( Mungos mungo ). The familiarity hypothesis predicts reduced aggression towards neighbours also in these species. We exposed free-living banded mongoose groups to translocated scent marks of neighbouring groups and strangers. Groups vocalized more and inspected more samples in response to olfactory cues of the neighbours than to the strangers. Our results support the threat-level hypothesis and contradict the familiarity hypothesis. We suggest that increased aggression towards neighbours is more common in social species with intense competition between neighbours, as opposed to reduced aggression towards neighbours typical for most solitary species.


Author(s):  
Bill Bailey ◽  
Robert Doleman

The belief that a static alarm system will safeguard critical infrastructure without additional support mechanisms is misplaced. This complacency is no longer satisfactory with the increase in worldwide threat levels and the potential social consequences. What is required is a more proactive, comprehensive security management process that adds to the ability to prevent, detect, deter, respond, and defeat potential harmful events and incidents. The model proposed here is proactive and grounded upon current operational procedures used by major companies in hostile and dangerous environments. By utilising a clearly defined comprehensive risk management tool, a more systematic security, threat, risk, and vulnerability assessment (STRVA), process can be developed. This process needs to identify deliberate targeting of assets through multiple intelligence gathering capabilities, plus defeat testing to probe existing security defences. The consequence approach to a potential breakthrough is at the essence of this methodology.


2021 ◽  
Vol 13 (04) ◽  
pp. 41-58
Author(s):  
Akwetey Henry Matey ◽  
Paul Danquah ◽  
Godfred Yaw Koi-Akrofi ◽  
Isaac Asampana

A technology platform that is gradually bridging the gap between object visibility and remote accessibility is the Internet of Things (IoT). Rapid deployment of this application can significantly transform the health, housing, and power (distribution and generation) sectors, etc. It has considerably changed the power sector regarding operations, services optimization, power distribution, asset management and aided in engaging customers to reduce energy consumption. Despite its societal opportunities and the benefits it presents, the power generation sector is bedeviled with many security challenges on the critical infrastructure. This review discusses the security challenges posed by IoT in power generation and critical infrastructure. To achieve this, the authors present the various IoT applications, particularly on the grid infrastructure, from an empirical literature perspective. The authors concluded by discussing how the various entities in the sector can overcome these security challenges to ensure an exemplary future IoT implementation on the power critical infrastructure value chain.


Sign in / Sign up

Export Citation Format

Share Document