Knowledge (XXG)

Infrastructure security

Source 📝

142: 112:
Critical infrastructures naturally utilize information technology as this capability has become more and more available. As a result, they have become highly interconnected, and interdependent. Intrusions and disruptions in one infrastructure might provoke unexpected failures in others, which makes
331:
to detect and respond to intruders and other security events. Meanwhile, maritime and offshore critical infrastructure sites can benefit from the deployment of satellite imagery, sensors, advanced patrol aircraft, autonomous underwater vehicles and anti-drone capabilities, among other solutions.
202:
Critical infrastructure is vital for essential functioning of a country. Incidental or deliberate damage will have serious impact on the economy as well as providing essential services to the communities it serves. There are a number of reasons why infrastructure needs to be heavily secured and
275:
Sabotage can damage electrical sources for the power grid, including civilian nuclear power stations. Sabotage in the form of cyberattacks can create havoc with computer, communication, and information systems, which could severely interrupt the electrical supply. This in turn can cause major
271:
One of the fundamental foundations of modern society is the electrical power systems. An intentional disruption of electricity supplies would affect national security, the economy, and every person's life. Because power grids and their sources are widely dispersed, this is a challenge for the
279:
One method is to isolate load systems. Sophisticated defense systems should be wide-area, real-time protection, with control systems that are alerted and guided by sensing technologies. Communication and information must be capably routed.
288:
Many countries have initiated government agencies to directly manage the security of critical infrastructure usually through the Ministry of Interior/Home Affairs, dedicated security agencies to protect facilities such as
309: 116:
There are several examples where an incident at one critical infrastructure site affects others. For example, in 2003, the Northeastern American areas experienced a
418: 245: 220:– person of groups breaking into critical infrastructure sites like electrical substations or telecommunication towers to steal materials or equipment (e.g. 240:- private person hacking for private gain or countries initiating attacks to glean information and also damage a country's infrastructure. For example, in 591: 408: 290: 163: 413: 381: 304:
A number of government organizations focus on infrastructure security and protection. In the USA, the Technical Support Working Group has the
316: 259: 519: 230:- person or groups such as ex-employee, political groups against governments, environmental groups in defense of environment. Refer to 231: 189: 566: 438: 167: 90: 606: 241: 211: 488: 254:- hurricane or natural events which damage critical infrastructure such as oil pipelines, water and power grids. See 152: 718: 305: 117: 171: 156: 294: 661: 464: 713: 39: 120:
that appears to have originated in the Midwest, and possibly from a tree branch. In 2013, damage caused by
733: 723: 633:(April 2002). "Security Challenges for the Electricity Infrastructure (Supplement to Computer Magazine)". 125: 728: 371: 121: 66: 124:
at an electrical substation in California threatened power distribution throughout Silicon Valley. The
276:
disruptions to other infrastructure components of society. Comprehensive defense plans are proposed.
346: 237: 542: 320: 70: 585: 376: 356: 341: 210:- person or groups deliberately targeting critical infrastructure for political gain. In the 642: 534: 396: 361: 251: 97:. Infrastructure security seeks to limit vulnerability of these structures and systems to 328: 324: 50: 35: 17: 570: 707: 386: 366: 298: 255: 106: 62: 630: 546: 391: 94: 86: 442: 351: 221: 141: 78: 538: 207: 102: 492: 646: 227: 98: 54: 31: 607:"Sniper fire on Silicon Valley power grid spurs ex-regulator's crusade" 82: 47: 43: 693: 214:, the Mumbai central station and hospital were deliberately targeted. 58: 217: 135: 74: 293:, as well as dedicated transport police such as the UK's 272:
effectiveness of defensive organizations and structures.
698: 688: 419:
North American Electric Reliability Corporation (NERC)
267:
Security challenges for the electricity infrastructure
662:"Required: Sentinels for Europe's Maritime Lifelines" 465:"Required: Sentinels for Europe's Maritime Lifelines" 310:
National Infrastructure Security Co-ordination Centre
128:
caused telecommunications outages in several states.
513: 511: 509: 232:
Bangkok's International Airport Seized by Protestors
689:US Transportation Security Administration Website 699:Partnership for Critical Infrastructure Security 694:UK Department of Transport's Transport Security 246:cyberattacks during the 2008 South Ossetia war 8: 170:. Unsourced material may be challenged and 132:Potential causes of infrastructure failure 315:Critical infrastructure sites may deploy 190:Learn how and when to remove this message 113:handing interdependencies a key concern. 520:"Strategic Power Infrastructure Defense" 409:United States Federal Protective Service 291:United States Federal Protective Service 430: 414:National Infrastructure Protection Plan 590:: CS1 maint: archived copy as title ( 583: 382:High-voltage transformer fire barriers 605:Martinez, Michael (8 February 2014). 317:perimeter intrusion detection systems 260:Economic effects of Hurricane Katrina 7: 168:adding citations to reliable sources 666:Center for European Policy Analysis 469:Center for European Policy Analysis 306:Infrastructure Protection Subgroup 25: 518:Li, Hao; et al. (May 2005). 140: 91:liquefied natural gas terminals 403:US or North American specific: 1: 212:November 2008 Mumbai attacks 750: 65:, network communications, 539:10.1109/JPROC.2005.847260 295:British Transport Police 527:Proceedings of the IEEE 489:"TSA | Who We Are" 242:cyberattacks on Estonia 40:critical infrastructure 28:Infrastructure security 18:Infrastructure Security 660:Trakimavicius, Lukas. 463:Trakimavicius, Lukas. 301:in the United States. 126:2020 Nashville bombing 647:10.1109/MC.2002.10042 372:Supply chain security 164:improve this section 34:provided to protect 347:Information warfare 238:Information warfare 321:video surveillance 719:National security 377:Physical security 357:Homeland security 342:National security 308:. The UK has the 200: 199: 192: 16:(Redirected from 741: 676: 675: 673: 672: 657: 651: 650: 627: 621: 620: 618: 617: 602: 596: 595: 589: 581: 579: 578: 569:. Archived from 563: 557: 556: 554: 553: 524: 515: 504: 503: 501: 500: 491:. Archived from 485: 479: 478: 476: 475: 460: 454: 453: 451: 450: 441:. Archived from 435: 397:Nuclear security 367:Seaport security 362:Airport security 329:security systems 252:Natural disaster 195: 188: 184: 181: 175: 144: 136: 71:electricity grid 21: 749: 748: 744: 743: 742: 740: 739: 738: 704: 703: 685: 680: 679: 670: 668: 659: 658: 654: 629: 628: 624: 615: 613: 604: 603: 599: 582: 576: 574: 567:"Archived copy" 565: 564: 560: 551: 549: 522: 517: 516: 507: 498: 496: 487: 486: 482: 473: 471: 462: 461: 457: 448: 446: 439:"TSA: Highways" 437: 436: 432: 427: 338: 286: 269: 196: 185: 179: 176: 161: 145: 134: 122:a sniper attack 23: 22: 15: 12: 11: 5: 747: 745: 737: 736: 731: 726: 721: 716: 714:Infrastructure 706: 705: 702: 701: 696: 691: 684: 683:External links 681: 678: 677: 652: 622: 597: 558: 533:(5): 918–933. 505: 480: 455: 429: 428: 426: 423: 422: 421: 416: 411: 400: 399: 394: 389: 384: 379: 374: 369: 364: 359: 354: 349: 344: 337: 334: 325:access control 285: 282: 268: 265: 264: 263: 249: 235: 225: 215: 198: 197: 148: 146: 139: 133: 130: 87:oil refineries 63:transport hubs 51:rail transport 36:infrastructure 24: 14: 13: 10: 9: 6: 4: 3: 2: 746: 735: 734:Public safety 732: 730: 727: 725: 724:Civil defense 722: 720: 717: 715: 712: 711: 709: 700: 697: 695: 692: 690: 687: 686: 682: 667: 663: 656: 653: 648: 644: 640: 636: 632: 631:Massoud, Amin 626: 623: 612: 608: 601: 598: 593: 587: 573:on 2015-12-30 572: 568: 562: 559: 548: 544: 540: 536: 532: 528: 521: 514: 512: 510: 506: 495:on 2008-12-16 494: 490: 484: 481: 470: 466: 459: 456: 445:on 2008-12-02 444: 440: 434: 431: 424: 420: 417: 415: 412: 410: 407: 406: 405: 404: 398: 395: 393: 390: 388: 387:Civil defense 385: 383: 380: 378: 375: 373: 370: 368: 365: 363: 360: 358: 355: 353: 350: 348: 345: 343: 340: 339: 335: 333: 330: 326: 322: 318: 313: 311: 307: 302: 300: 299:Amtrak Police 296: 292: 283: 281: 277: 273: 266: 261: 257: 256:Hurricane Ike 253: 250: 247: 243: 239: 236: 233: 229: 226: 223: 219: 216: 213: 209: 206: 205: 204: 194: 191: 183: 180:February 2021 173: 169: 165: 159: 158: 154: 149:This section 147: 143: 138: 137: 131: 129: 127: 123: 119: 114: 110: 108: 107:contamination 104: 100: 96: 95:water systems 92: 88: 84: 80: 76: 72: 68: 64: 60: 56: 52: 49: 45: 41: 38:, especially 37: 33: 29: 19: 729:Paramilitary 669:. Retrieved 665: 655: 638: 634: 625: 614:. Retrieved 610: 600: 575:. Retrieved 571:the original 561: 550:. Retrieved 530: 526: 497:. Retrieved 493:the original 483: 472:. Retrieved 468: 458: 447:. Retrieved 443:the original 433: 402: 401: 392:Paramilitary 314: 303: 287: 278: 274: 270: 201: 186: 177: 162:Please help 150: 118:power outage 115: 111: 79:power plants 27: 26: 352:Cyberattack 222:metal theft 203:protected. 708:Categories 671:2023-07-26 616:2020-01-27 577:2009-10-25 552:2009-11-07 499:2008-12-07 474:2023-07-26 449:2008-12-07 425:References 327:and other 42:, such as 208:Terrorism 151:does not 103:terrorism 55:hospitals 641:(4): 8. 635:Computer 586:cite web 336:See also 284:Remedies 228:Sabotage 99:sabotage 83:seaports 48:highways 44:airports 32:security 547:3242429 172:removed 157:sources 59:bridges 30:is the 545:  105:, and 69:, the 543:S2CID 523:(PDF) 218:Theft 67:media 592:link 297:and 258:and 244:and 155:any 153:cite 93:and 75:dams 643:doi 611:CNN 535:doi 166:by 710:: 664:. 639:35 637:. 609:. 588:}} 584:{{ 541:. 531:93 529:. 525:. 508:^ 467:. 323:, 319:, 312:. 109:. 101:, 89:, 85:, 81:, 77:, 73:, 61:, 57:, 53:, 46:, 674:. 649:. 645:: 619:. 594:) 580:. 555:. 537:: 502:. 477:. 452:. 262:. 248:. 234:. 224:) 193:) 187:( 182:) 178:( 174:. 160:. 20:)

Index

Infrastructure Security
security
infrastructure
critical infrastructure
airports
highways
rail transport
hospitals
bridges
transport hubs
media
electricity grid
dams
power plants
seaports
oil refineries
liquefied natural gas terminals
water systems
sabotage
terrorism
contamination
power outage
a sniper attack
2020 Nashville bombing

cite
sources
improve this section
adding citations to reliable sources
removed

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.