Old Problems, New Challenges
Chapter 19: Public utility physical and cybersecurity challenges
In 2010, a large communications services provider described the security threat to U.S. and other nations’ utilities as placing them in Among the threats they saw on the horizon with the potential physical damage to utility infrastructure was the growing incidence of cyberattacks on the computer and communications systems of public utilities. These systems make up the electronic nerve system that must be protected against internal and external threats of malicious damage to utilities’ operations and distributions systems. The service provider added that the federal government has evidence that shows that many utilities’ computer systems have already have been breached, and that bits of code left behind can be activated in time of war or a terrorist attack to bring down major portions of the U.S. electric grid, water and transportation systems and other essential infrastructure and public service systems. This chapter looks at ways utilities plan for the operational crises caused by these man-made hazards along with the many natural disasters that they must deal with on a regular basis. The crisis amelioration methods already in place are equally valuable for dealing with crises caused by terrorists.Environmental hazards can be any situation or state of events that pose a threat to the surrounding work, community or natural environment, and which adversely affect people’s health. Categories are shown in . This term includes topics like pollution and natural disasters such as storms and earthquakes and many more. Environmental hazards can be categorized in six types: natural, chemical, physical, mechanical, biological and...
You are not authenticated to view the full text of this chapter or article.
Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.
Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.
Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.