142:
112:
Critical infrastructures naturally utilize information technology as this capability has become more and more available. As a result, they have become highly interconnected, and interdependent. Intrusions and disruptions in one infrastructure might provoke unexpected failures in others, which makes
331:
to detect and respond to intruders and other security events. Meanwhile, maritime and offshore critical infrastructure sites can benefit from the deployment of satellite imagery, sensors, advanced patrol aircraft, autonomous underwater vehicles and anti-drone capabilities, among other solutions.
202:
Critical infrastructure is vital for essential functioning of a country. Incidental or deliberate damage will have serious impact on the economy as well as providing essential services to the communities it serves. There are a number of reasons why infrastructure needs to be heavily secured and
275:
Sabotage can damage electrical sources for the power grid, including civilian nuclear power stations. Sabotage in the form of cyberattacks can create havoc with computer, communication, and information systems, which could severely interrupt the electrical supply. This in turn can cause major
271:
One of the fundamental foundations of modern society is the electrical power systems. An intentional disruption of electricity supplies would affect national security, the economy, and every person's life. Because power grids and their sources are widely dispersed, this is a challenge for the
279:
One method is to isolate load systems. Sophisticated defense systems should be wide-area, real-time protection, with control systems that are alerted and guided by sensing technologies. Communication and information must be capably routed.
288:
Many countries have initiated government agencies to directly manage the security of critical infrastructure usually through the
Ministry of Interior/Home Affairs, dedicated security agencies to protect facilities such as
309:
116:
There are several examples where an incident at one critical infrastructure site affects others. For example, in 2003, the
Northeastern American areas experienced a
418:
245:
220:– person of groups breaking into critical infrastructure sites like electrical substations or telecommunication towers to steal materials or equipment (e.g.
240:- private person hacking for private gain or countries initiating attacks to glean information and also damage a country's infrastructure. For example, in
591:
408:
290:
163:
413:
381:
304:
A number of government organizations focus on infrastructure security and protection. In the USA, the
Technical Support Working Group has the
316:
259:
519:
230:- person or groups such as ex-employee, political groups against governments, environmental groups in defense of environment. Refer to
231:
189:
566:
438:
167:
90:
606:
241:
211:
488:
254:- hurricane or natural events which damage critical infrastructure such as oil pipelines, water and power grids. See
152:
718:
305:
117:
171:
156:
294:
661:
464:
713:
39:
120:
that appears to have originated in the
Midwest, and possibly from a tree branch. In 2013, damage caused by
733:
723:
633:(April 2002). "Security Challenges for the Electricity Infrastructure (Supplement to Computer Magazine)".
125:
728:
371:
121:
66:
124:
at an electrical substation in
California threatened power distribution throughout Silicon Valley. The
276:
disruptions to other infrastructure components of society. Comprehensive defense plans are proposed.
346:
237:
542:
320:
70:
585:
376:
356:
341:
210:- person or groups deliberately targeting critical infrastructure for political gain. In the
642:
534:
396:
361:
251:
97:. Infrastructure security seeks to limit vulnerability of these structures and systems to
328:
324:
50:
35:
17:
570:
707:
386:
366:
298:
255:
106:
62:
630:
546:
391:
94:
86:
442:
351:
221:
141:
78:
538:
207:
102:
492:
646:
227:
98:
54:
31:
607:"Sniper fire on Silicon Valley power grid spurs ex-regulator's crusade"
82:
47:
43:
693:
214:, the Mumbai central station and hospital were deliberately targeted.
58:
217:
135:
74:
293:, as well as dedicated transport police such as the UK's
272:
effectiveness of defensive organizations and structures.
698:
688:
419:
North
American Electric Reliability Corporation (NERC)
267:
Security challenges for the electricity infrastructure
662:"Required: Sentinels for Europe's Maritime Lifelines"
465:"Required: Sentinels for Europe's Maritime Lifelines"
310:
128:
caused telecommunications outages in several states.
513:
511:
509:
232:
689:US Transportation Security Administration Website
699:Partnership for Critical Infrastructure Security
694:UK Department of Transport's Transport Security
246:cyberattacks during the 2008 South Ossetia war
8:
170:. Unsourced material may be challenged and
132:Potential causes of infrastructure failure
315:Critical infrastructure sites may deploy
190:Learn how and when to remove this message
113:handing interdependencies a key concern.
520:"Strategic Power Infrastructure Defense"
409:United States Federal Protective Service
291:United States Federal Protective Service
430:
414:National Infrastructure Protection Plan
590:: CS1 maint: archived copy as title (
583:
382:High-voltage transformer fire barriers
605:Martinez, Michael (8 February 2014).
317:perimeter intrusion detection systems
260:Economic effects of Hurricane Katrina
7:
168:adding citations to reliable sources
666:Center for European Policy Analysis
469:Center for European Policy Analysis
306:Infrastructure Protection Subgroup
25:
518:Li, Hao; et al. (May 2005).
140:
91:liquefied natural gas terminals
403:US or North American specific:
1:
212:November 2008 Mumbai attacks
750:
65:, network communications,
539:10.1109/JPROC.2005.847260
295:British Transport Police
527:Proceedings of the IEEE
489:"TSA | Who We Are"
242:cyberattacks on Estonia
40:critical infrastructure
28:Infrastructure security
18:Infrastructure Security
660:Trakimavicius, Lukas.
463:Trakimavicius, Lukas.
301:in the United States.
126:2020 Nashville bombing
647:10.1109/MC.2002.10042
372:Supply chain security
164:improve this section
34:provided to protect
347:Information warfare
238:Information warfare
321:video surveillance
719:National security
377:Physical security
357:Homeland security
342:National security
308:. The UK has the
200:
199:
192:
16:(Redirected from
741:
676:
675:
673:
672:
657:
651:
650:
627:
621:
620:
618:
617:
602:
596:
595:
589:
581:
579:
578:
569:. Archived from
563:
557:
556:
554:
553:
524:
515:
504:
503:
501:
500:
491:. Archived from
485:
479:
478:
476:
475:
460:
454:
453:
451:
450:
441:. Archived from
435:
397:Nuclear security
367:Seaport security
362:Airport security
329:security systems
252:Natural disaster
195:
188:
184:
181:
175:
144:
136:
71:electricity grid
21:
749:
748:
744:
743:
742:
740:
739:
738:
704:
703:
685:
680:
679:
670:
668:
659:
658:
654:
629:
628:
624:
615:
613:
604:
603:
599:
582:
576:
574:
567:"Archived copy"
565:
564:
560:
551:
549:
522:
517:
516:
507:
498:
496:
487:
486:
482:
473:
471:
462:
461:
457:
448:
446:
439:"TSA: Highways"
437:
436:
432:
427:
338:
286:
269:
196:
185:
179:
176:
161:
145:
134:
122:a sniper attack
23:
22:
15:
12:
11:
5:
747:
745:
737:
736:
731:
726:
721:
716:
714:Infrastructure
706:
705:
702:
701:
696:
691:
684:
683:External links
681:
678:
677:
652:
622:
597:
558:
533:(5): 918–933.
505:
480:
455:
429:
428:
426:
423:
422:
421:
416:
411:
400:
399:
394:
389:
384:
379:
374:
369:
364:
359:
354:
349:
344:
337:
334:
325:access control
285:
282:
268:
265:
264:
263:
249:
235:
225:
215:
198:
197:
148:
146:
139:
133:
130:
87:oil refineries
63:transport hubs
51:rail transport
36:infrastructure
24:
14:
13:
10:
9:
6:
4:
3:
2:
746:
735:
734:Public safety
732:
730:
727:
725:
724:Civil defense
722:
720:
717:
715:
712:
711:
709:
700:
697:
695:
692:
690:
687:
686:
682:
667:
663:
656:
653:
648:
644:
640:
636:
632:
631:Massoud, Amin
626:
623:
612:
608:
601:
598:
593:
587:
573:on 2015-12-30
572:
568:
562:
559:
548:
544:
540:
536:
532:
528:
521:
514:
512:
510:
506:
495:on 2008-12-16
494:
490:
484:
481:
470:
466:
459:
456:
445:on 2008-12-02
444:
440:
434:
431:
424:
420:
417:
415:
412:
410:
407:
406:
405:
404:
398:
395:
393:
390:
388:
387:Civil defense
385:
383:
380:
378:
375:
373:
370:
368:
365:
363:
360:
358:
355:
353:
350:
348:
345:
343:
340:
339:
335:
333:
330:
326:
322:
318:
313:
311:
307:
302:
300:
299:Amtrak Police
296:
292:
283:
281:
277:
273:
266:
261:
257:
256:Hurricane Ike
253:
250:
247:
243:
239:
236:
233:
229:
226:
223:
219:
216:
213:
209:
206:
205:
204:
194:
191:
183:
180:February 2021
173:
169:
165:
159:
158:
154:
149:This section
147:
143:
138:
137:
131:
129:
127:
123:
119:
114:
110:
108:
107:contamination
104:
100:
96:
95:water systems
92:
88:
84:
80:
76:
72:
68:
64:
60:
56:
52:
49:
45:
41:
38:, especially
37:
33:
29:
19:
729:Paramilitary
669:. Retrieved
665:
655:
638:
634:
625:
614:. Retrieved
610:
600:
575:. Retrieved
571:the original
561:
550:. Retrieved
530:
526:
497:. Retrieved
493:the original
483:
472:. Retrieved
468:
458:
447:. Retrieved
443:the original
433:
402:
401:
392:Paramilitary
314:
303:
287:
278:
274:
270:
201:
186:
177:
162:Please help
150:
118:power outage
115:
111:
79:power plants
27:
26:
352:Cyberattack
222:metal theft
203:protected.
708:Categories
671:2023-07-26
616:2020-01-27
577:2009-10-25
552:2009-11-07
499:2008-12-07
474:2023-07-26
449:2008-12-07
425:References
327:and other
42:, such as
208:Terrorism
151:does not
103:terrorism
55:hospitals
641:(4): 8.
635:Computer
586:cite web
336:See also
284:Remedies
228:Sabotage
99:sabotage
83:seaports
48:highways
44:airports
32:security
547:3242429
172:removed
157:sources
59:bridges
30:is the
545:
105:, and
69:, the
543:S2CID
523:(PDF)
218:Theft
67:media
592:link
297:and
258:and
244:and
155:any
153:cite
93:and
75:dams
643:doi
611:CNN
535:doi
166:by
710::
664:.
639:35
637:.
609:.
588:}}
584:{{
541:.
531:93
529:.
525:.
508:^
467:.
323:,
319:,
312:.
109:.
101:,
89:,
85:,
81:,
77:,
73:,
61:,
57:,
53:,
46:,
674:.
649:.
645::
619:.
594:)
580:.
555:.
537::
502:.
477:.
452:.
262:.
248:.
234:.
224:)
193:)
187:(
182:)
178:(
174:.
160:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.