About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
ew 19(22): e2

Research Article

Application of a Hybrid Method for Key Energy Facilities Safety Assessment

Download1109 downloads
Cite
BibTeX Plain Text
  • @ARTICLE{10.4108/eai.13-7-2018.156386,
        author={I.I. Livshitz and P.A. Lontsikh and E.P. Kunakov},
        title={Application of a Hybrid Method for Key Energy Facilities Safety Assessment},
        journal={EAI Endorsed Transactions on Energy Web},
        volume={6},
        number={22},
        publisher={EAI},
        journal_a={EW},
        year={2019},
        month={1},
        keywords={Fuel, energy, assessment, security, information, function, risk, vulnerability, threat, ISO, IEC, requirement},
        doi={10.4108/eai.13-7-2018.156386}
    }
    
  • I.I. Livshitz
    P.A. Lontsikh
    E.P. Kunakov
    Year: 2019
    Application of a Hybrid Method for Key Energy Facilities Safety Assessment
    EW
    EAI
    DOI: 10.4108/eai.13-7-2018.156386
I.I. Livshitz1,*, P.A. Lontsikh2, E.P. Kunakov3
  • 1: PhD, SPIIRAS, St. Petersburg
  • 2: Doctor of Science, Irkutsk National Research Technical University
  • 3: Postgraduate, Irkutsk National Research Technical University
*Contact email: Livshitz.il@yandex.ru

Abstract

Information Technologies (hereinafter – the “IT”) without security functions (hereinafter – the “SF”) are the exception rather than the rule nowadays [1 – 4]. Components of IT without SF are not a big problem since they can be replaced by analogs, which SF have, or can be supplemented by the necessary "imposed" SF, or we can "import" the required SF from the adjacent components of IT, which are an integral part of the information processing system (hereinafter – the “IPS”). Speaking further of IT, we will assume that the modern IT components presented in the competitive market for energy facilities (hereinafter – the “EF”) already have a certain set of SF and are able to support IT-security tasks (hereinafter – the “IST”). Many scientists have done enough research on various safety issues at facilities and published their results [5 – 13]. These studies also concern the causes of various incidents at key facilities, especially energy ones, risk identification, and the analysis of the consequences for safety. Against this background, the problem of adequate IT-security assessment of the EF is particularly relevant [14 – 16]. Indeed, why should we spend the resources on the implementation of additional "superimposed" SF in IPS, if there is an opportunity to optimize costs by using existing and practically "spent" SF? In this case, a reasonable solution would be to assess the existing level of IT-security related to the architecture of IPS resulting from the composition of IT-components that have SF for key EF [17 – 21]. Based on the results of the evaluation, it is possible to make a decision on the implementation of new additional SF in IPS based on documented facts.

Keywords
Fuel, energy, assessment, security, information, function, risk, vulnerability, threat, ISO, IEC, requirement
Received
2018-05-05
Accepted
2018-07-03
Published
2019-01-28
Publisher
EAI
http://dx.doi.org/10.4108/eai.13-7-2018.156386

Copyright © 2019 I.I. Livshitz et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.

EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL