How to Mitigate Threats to Substation Security?

Perimeter Security for Sub-Stations

The good news regarding many of these types of threats is that there are steps officials can take to mitigate them or, in some cases, eliminate them entirely.

Substations need to undergo a layered approach to security. Security should be separated into a zone-by-zone basis with the following minimums

  • Outer Perimeter Security
  • Inner Perimeter Security
  • Cyber Security

Technology, in each zone, should be used in tandem with one another for space protection, intruder detection, and intrusion prevention. Some of the technological solutions being used in these cases are video analytics, gunshot detection analytics, outdoor motion sensors, vibration sensors, radar, and more.

When it comes to outer-perimeter security, a layered approach is a necessity. In the past, this was limited to a chain link fence and a padlock. That may have worked in the past, but isn’t much more than a deterrence to stop criminals today. Today, companies should consider having a dual-perimeter, along with the technology to sense, analyze, and track any intrusion threats that near the facility. In considering the attack on the Metcalf substation, and the fact that unmanned aerial vehicles are posing a new threat to substation security, some companies are discussing enclosing their substations entirely.

Minimizing Risks Moving Forward

Power companies are planning to spend hundreds of millions of dollars over the next decade, applying both physical and cyber security solutions to prevent attacks and accidents at substations. The key is to stay ahead of the curve on current risks, vulnerabilities, and threats while also keeping an eye on new, emerging threats that need to be proactively considered and planned for.

Having a secure substation means identifying the risks and vulnerabilities of each, individual facility, and putting in place a security system and processes to protect against those issues. Homegrown terrorism threats aren't just a danger to a power company. It's a threat to the infrastructure of our country.

Real security of the national infrastructure won't come from only power companies spending money on security systems. It will come when local, state, and federal governments realize they are all stakeholders. Not only that, but the citizens themselves can be a layer of security, keeping a vigilant and watchful eye for suspicious activity near our critical power facilities.

When we realize we are all stakeholders, from the individual citizen, to the government officials, to the power company executives, we can start the discussion of truly securing our power infrastructure.

 

Source: Secura Dyne

07 Perimeter Security for Sub Stations

Perimeter Security for Sub-Stations.

Perimeter Security, Video Intrusion Detection, Fiber Optic Security System, Marine Security, Marine Net, Under Water Marine Net Detection, Under Water Marine Detection, Under Water Security, Security Under Water, Perimeter Security, Fiber Optic Sensor, Fence Detection, Fiber Optic Net, Airport Security, Nuclear Facilities Security, Nuclear Security, Government Security, Perimeter Security for Federal Government, Fiber Optic for Perimeter Security, Perimeter Security for Oil and Gas, Perimeter Security for Water Utilities, Perimeter Security for Treatment Plants, Perimeter Security for Storage Tanks, Perimeter Security for Dams, Perimeter Security for Reservoirs, Perimeter Security for Electric Utilities, Perimeter Security for Generation Plants, Perimeter Security for Sub-Stations, Perimeter Security for Switchyards, Perimeter Security for Chemical Facilities, Perimeter Security for Chemical Plants, Perimeter Security for Refineries, Perimeter Security for LNG Plants,Perimeter Security for Storage Facilities, Perimeter Security for Transportation Industry, Perimeter Security for Airports, Perimeter Security for Seaports, Perimeter Security for Roads and Railroads, Perimeter Security for High Security Sites, Perimeter Security for Government Facilities, Perimeter Security for Nuclear Plants, Perimeter Security for Military Bases, Perimeter Security for Prisons, Perimeter Security for Oil and Gas, Perimeter Security for Oil Fields, Perimeter Security for Storage Facilities, Perimeter Security for Refineries.