Handbook on Resilience of Socio-Technical Systems
Show Less

Handbook on Resilience of Socio-Technical Systems

Edited by Matthias Ruth and Stefan Goessling-Reisemann

The goal to improve the resilience of social systems – communities and their economies – is increasingly adopted by decision makers. This unique and comprehensive Handbook focuses on the interdependencies of these social systems and the technologies that support them. Special attention is given to the ways in which resilience is conceptualized by different disciplines, how resilience may be assessed, and how resilience strategies are implemented. Case illustrations are presented throughout to aid understanding.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 17: IT security for functional resilience in energy systems: effect-centric IT security

Lars Fischer and Sebastian Lehnhoff


From the point of view of energy system operators, cyberattacks, that is, information technology (IT)-security incidents, comprise an additional source for reduced functionality or system failure. In this capability cyberattacks ‘compete’ with unintentional disturbances like weather, natural disasters and accidental disruptions. Information technology-security experts, developing countermeasures to cyberattacks, primarily are concerned with intelligent, complex, malicious attacks that must be defended against using dedicated countermeasures and security processes. In order to prevent degraded function of energy systems through intentional attacks, for example, effecting a blackout or instabilities, functional resilience of the energy system is mandatory.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.