Research Article
Application of a Hybrid Method for Key Energy Facilities Safety Assessment
@ARTICLE{10.4108/eai.13-7-2018.156386, author={I.I. Livshitz and P.A. Lontsikh and E.P. Kunakov}, title={Application of a Hybrid Method for Key Energy Facilities Safety Assessment}, journal={EAI Endorsed Transactions on Energy Web}, volume={6}, number={22}, publisher={EAI}, journal_a={EW}, year={2019}, month={1}, keywords={Fuel, energy, assessment, security, information, function, risk, vulnerability, threat, ISO, IEC, requirement}, doi={10.4108/eai.13-7-2018.156386} }
- I.I. Livshitz
P.A. Lontsikh
E.P. Kunakov
Year: 2019
Application of a Hybrid Method for Key Energy Facilities Safety Assessment
EW
EAI
DOI: 10.4108/eai.13-7-2018.156386
Abstract
Information Technologies (hereinafter – the “IT”) without security functions (hereinafter – the “SF”) are the exception rather than the rule nowadays [1 – 4]. Components of IT without SF are not a big problem since they can be replaced by analogs, which SF have, or can be supplemented by the necessary "imposed" SF, or we can "import" the required SF from the adjacent components of IT, which are an integral part of the information processing system (hereinafter – the “IPS”). Speaking further of IT, we will assume that the modern IT components presented in the competitive market for energy facilities (hereinafter – the “EF”) already have a certain set of SF and are able to support IT-security tasks (hereinafter – the “IST”). Many scientists have done enough research on various safety issues at facilities and published their results [5 – 13]. These studies also concern the causes of various incidents at key facilities, especially energy ones, risk identification, and the analysis of the consequences for safety. Against this background, the problem of adequate IT-security assessment of the EF is particularly relevant [14 – 16]. Indeed, why should we spend the resources on the implementation of additional "superimposed" SF in IPS, if there is an opportunity to optimize costs by using existing and practically "spent" SF? In this case, a reasonable solution would be to assess the existing level of IT-security related to the architecture of IPS resulting from the composition of IT-components that have SF for key EF [17 – 21]. Based on the results of the evaluation, it is possible to make a decision on the implementation of new additional SF in IPS based on documented facts.
Copyright © 2019 I.I. Livshitz et al., licensed to EAI. This is an open access article distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/3.0/), which permits unlimited use, distribution and reproduction in any medium so long as the original work is properly cited.