Security of Infrastructure Systems: Infrastructure Security Assessment

Security of Infrastructure Systems: Infrastructure Security Assessment

Ladislav Mariš, Tomáš Loveček, Mike Zeegers
Copyright: © 2020 |Pages: 30
DOI: 10.4018/978-1-7998-3059-7.ch013
(Individual Chapters)
No Current Special Offers


The security of infrastructure systems is increasingly associated and ties to ensuring a company's basic functional continuity. Increasing security and ultimately the resilience of infrastructure systems is significantly linked to the process of infrastructure security assessment. It is obvious that the basic pillar of ensuring the required level of security and resilience of infrastructure systems is the level of physical security. Therefore, the chapter will discuss the methods for physical security assessment with a link to the different nature of selected infrastructure systems. The basic logic will be the exploitation of qualitative-quantitative methods, assessing an existing or proposed security system, based on certain measurable values such as probability of detection, response force time, delay time and probability of correct and timely guard communication, where based on this data, the probability of interruption is estimated.
Chapter Preview

Security Threats Relating To The Physical Security Of The Critical Infrastructure System

A system that incorporates individual subsystems of tangible, resp. intangible assets protection under the administration or ownership of the entity, and which are created by the expedient arrangement and application of security measures, are in practice referred to various attributes. The most commonly used terms are a security system, a property / object protection system, a physical protection system, a security system or an integrated security system.

Risk is a potential opportunity for something to happen that has a negative impact on the organisation’s objectives, measured by its consequences or probability estimation. While the term threat means the designation of a specific, physically existing entity, phenomenon or event (security incident) capable of causing damage or harm. Thus, the process of identifying security risks consists in detecting possible negative events and phenomena in various forms and forms in the security environment that may cause a breach of the security status of the protected interest. The basic breakdown of possible security risks is shown in Figure 1.

Figure 1.

Basic threat distribution scheme (Hofreiter et al., 2005)


Key Terms in this Chapter

Probability of Detection: The level of possibility of detection in a protected area with security measures. Risk: The effect of uncertainty on objectives.

Security Measures: Precautions taken to protected infrastructure against crime.

Risk Management: The techniques of minimizing and preventing loss.

Physical Security: Security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm.

Critical Infrastructure: The assets that are essential for the functioning of a society and economy especial in some country.

Risk Assessment: The act of deciding the level of risk.

Complete Chapter List

Search this Book: