4.7 Review

Personnel threats in the electric power critical infrastructure sector and their effect on dependent sectors: Overview in the Czech Republic

Journal

SAFETY SCIENCE
Volume 127, Issue -, Pages -

Publisher

ELSEVIER
DOI: 10.1016/j.ssci.2020.104698

Keywords

Critical infrastructure; Electric power; Personnel threats; Effects; Security solutions and measures

Funding

  1. Ministry of the Interior of the Czech Republic [VI20152019049]
  2. Dynamic Resilience Evaluation of Interrelated Critical Infrastructure

Ask authors/readers for more resources

The Electric Power Infrastructure Sector is a uniquely critical sector among other critical infrastructures. Disruptions to or failures of its functions would result in extensive effects, not only on society itself but also on all of the (other) dependent critical infrastructure sectors. The key areas of electric power supply systems that demonstrate the greatest vulnerability to terrorist attacks include the following areas of vulnerability: physical vulnerability, cyber vulnerability and personnel vulnerability. Considerable attention is devoted to the problems and issues of external anthropogenic threats (e.g. terrorism). Internal intentional anthropogenic threats represent an almost neglected sector in the field of security research. Based on this fact, this article studies the issues of threats to and by personnel in the electric power critical infrastructure sector and their influence and effect on dependent critical infrastructure sectors. Attention is especially given to defining these threats and their (further) categorization into two groups: physical and cyber threats. Equally, this article also highlights the impacts of personnel threats in dependent critical infrastructure sectors. The main part of this paper focuses on security measures that can be used to minimize the potential impact of personnel threats. This especially concerns (1) assessing the resilience of elements in the electric power critical infrastructure sector to personnel threats, (2) defining the requirements for personnel security, and (3) the use of standard technical and innovative technologies to monitor and assess the activities of authorized or non-authorized persons.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available