classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


The need for resilience in national infrastructure
November 2018, Government and Parastatal (Industry), Cyber Security, Security Services & Risk Management

The industries and infrastructure on which so much of our daily lives depend are deep in the midst of mass digitisation. Whether it’s processing huge quantities of data or using smart technologies to connect together the grid networks and devices which power our towns and cities, it’s out with paper-filled filing cabinets and legacy systems and in with software-defined and data-driven infrastructure.

While there are a great many benefits to be gleaned from this digital transformation, there is one obvious caveat: with digitisation comes the potential for cyber attackers to undermine and attack our critical national infrastructure.

Kate Mollett
Kate Mollett

An international data-driven vision

The appetite for digitisation is not only industry-wide, it’s international. By 2020, it’s expected that 72% of European consumers will have a smart meter for electricity, while figures from the European Commission’s most recent benchmark indicate these smart meters are registering 3% electricity savings on average. Data availability is fundamental to the success of smart metering with energy providers looking to ‘gamify’ the process of saving energy. According to a 2018 Energy Research & Social Science report, engaging residential energy users through gamification and providing information about consumption levels which they can compare against neighbours and friends is crucial to nudge them towards reducing consumption.

Taking a step back from energy consumption and thinking about its production, data has been described as the new oil – an even more valuable resource for the oil and gas exploration industry than crude itself. Data science experts assert that collecting big data analytics and real-time analysis can improve oil and gas production by 6-8%.

As well as improving product yields, in the world of drilling and completion, data quite literally gives sight to the blind, enabling engineers to better understand the risk of drilling certain wells, as well as improve the accuracy of drilling methods to reduce risk and increase production. Given the sheer volumes of data which oil and gas companies produce on a daily basis, digital transformation is not only necessary but must be rapid and continuous.

The challenge when it comes to digitising grid systems such as electricity, oil, gas and water is that once a network is software-defined it no longer needs to be unplugged at the mains or experience a sudden loss of power for outages to occur. Effectively, there is another way of turning off the lights and that is through a cyber breach. The cyber-attack on German energy firm EnBW last year and Siemens research finding that oil and gas firms are the most hacked serve as significant warnings that national infrastructure providers are primary targets for hackers.

Given the critical nature of power networks, in the era of ransomware and extortion-led hacking, it’s wholly unsurprising that they are subject to cyber-attack. While cybersecurity is of paramount importance, attacks cannot always be stopped at source, which means energy firms need robust recovery processes in place to minimise downtime.

Given that even a minor outage can be catastrophic and costly for these companies, investing in an always-on operational solution is of primary importance. Combined with a data management strategy that takes a holistic view of data across its lifecycle, a dedicated enterprise platform helps businesses reap the benefits of intelligent data management, ensuring that data is always protected, compliant and available.

Mitigating disaster in the clouds

Another industry which, for obvious reasons, has to take every imaginable precaution to protect against minor outages is aviation. Aircraft operate on some of the most highly sophisticated and secure computer systems known to man, but no computerised system is 100% immune from cyber-attack. While we tend to think of incredibly dramatic scenarios such as planes falling from the sky as hackers take control of the cockpit, the more likely security risks facing airlines regard passenger data.

Airlines are increasingly using artificial intelligence (AI) to perform end-to-end passenger identification and check-in procedures. Delta, for example, has invested in automated self-service bag checking kiosks and facial recognition technologies powered by AI as it believes the introduction of these technologies can greatly improve the customer flying experience.

The increasing volumes of aviation and airline data is one thing, but the diversity of this data is a whole different challenge. On one hand, you have the data being emitted from the aircraft, radio systems, baggage handlers, online check-in systems and security kiosks which all must be highly secured, anonymised, filtered and analysed in real-time as well as being stored and archived appropriately. Furthermore, airlines collect huge volumes of personal data from the millions of flyers each year. As well as highly sensitive personal details, this also includes banking and payment information.

Given the diverse array of data at the fingertips of aviation, as well as other private and public transport industries, companies are adopting multi-cloud strategies to guarantee a high level of data availability without compromising on data protection. A multi cloud environment, coupled with a best-in-class Disaster Recovery as a Service (DRaaS) solution, means operators can create user-friendly platforms and customer experiences, with a guaranteed level of service and failover.

If, as many commentators have suggested, data truly is the new oil, powering the digital transformation of everything, then national and international infrastructure providers must treat it as such. In doing so, data will become a hyper-available entity, which is protected by the most secure systems software engineers can build and mined for with increasing accuracy and enthusiasm. As crude oil is one of the most sought after substances by thieves, data has become the score which cyber-criminals aim for. Therefore, data-driven industries and enterprises must ensure that data is secure, protected and compliant, and that intelligent data management platforms are implemented and achieve their most critical business outcomes.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • ASIS Security Technology Concepts day
    April 2019, Technews Publishing, This Week's Editor's Pick, Security Services & Risk Management
    ASIS SA kicked the tyres of a few technologies at its first Security Technology Concepts day in February.
  • Securing a reliable source of backup power
    April 2019, Drensky Technologies, Mustek Security Technologies, Specialised Battery Systems, Security Services & Risk Management
    Dependence on a reliable and stable source of electrical power is a part of everyday life, whether for an individual or a business.
  • The value of having a maintenance contract or SLA
    April 2019, Johnson Controls, Mustek Security Technologies, Security Services & Risk Management
    A maintenance contract or SLA offers a company peace of mind regarding the functioning of their security installation.
  • When cybercrime affects health and safety
    April 2019, This Week's Editor's Pick, Cyber Security
    The threat of a category-one cyber-attack is that everything could seem right – the readings on the meter could be fine, checklists would be followed, and equipment would work – yet danger could still unfold.
  • Biodegradable security seals for SA
    April 2019, TruSeal, This Week's Editor's Pick, Asset Management, EAS, RFID, News, Security Services & Risk Management
    The new TruSeal product extension is produced from a special biodegradable material sourced from Malaysia.
  • CCTV operators’ duties to response personnel at crime scenes
    April 2019, Leaderware, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Security Services & Risk Management
    Control room operators often have a responsibility to monitor response scenes that go beyond the initial detection and response relationship.
  • Cyber/physical perils in hospitality
    April 2019, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security, Entertainment and Hospitality (Industry)
    How can we prepare for our holidays and avoid becoming the victim of a scam or data breach?
  • Better energy savings than BMS
    April 2019, Johnson Controls, Integrated Solutions, Security Services & Risk Management
    Central plant optimisation software provides better energy savings than BMS control alone.
  • Rethink security priorities
    April 2019, News, Cyber Security
    Cryptocurrency mining is up 237%, phishing attacks increase by 269%, business email compromise attacks have gone up by 28%.
  • Overcoming the 2019 cyberthreat
    April 2019, IT infrastructure, Cyber Security
    The flexibility of remote working is good, however, the wider a network perimeter has to stretch, the more scope exists for security breaches.
  • Halt, who goes there?
    March 2019, Technews Publishing, Wolfpack Information Risk, This Week's Editor's Pick, Cyber Security
    As long as organisations treat their physical and cyber domains as separate, there is little hope of securing either one.
  • Using security to enhance the customer experience?
    March 2019, Axis Communications SA, Fidelity ADT Security, ISDS, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, Security Services & Risk Management, Retail (Industry)
    Customer experience will overtake price and product as the key retail brand differentiator by the year 2020. Will the security industry be part of this transformation?

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.