PHYSICAL SECURITY FRAMEWORK FOR POWER PLANTS IN YEMEN
DOI:
https://doi.org/10.11113/jt.v73.5130Keywords:
Physical security, security model, power plantAbstract
This study aims to design a framework for physical security measures for Marib power plant in Yemen to protect it from the physical attacks. Power plants are very important infrastructures and electricity is very essential in all aspects of human life, and it is obvious that power plants must have a good security protection from attack. Physical security is the first layer in power plants security. In Yemen, there are 18 power plants that generate around 1268.05MW of electricity, such that 835.5MW is generated using steam and gas and 432.55 using Diesel. Marib Power Plant is the largest station in Yemen, it is providing 341 MW and 27% of the electricity. Moreover, Marib Power Plant supplies electricity to Sana’a, the capital city of Yemen, and other neighboring areas. However, Marib Power Plant faces many physical attacks, whicharethe local armed tribesman, bombing and sabotage. According to the reports from Ministry of Electricity, these attacks caused many social, political and economic problems for the citizens and government. Therefore, this study shows that (Deterrence, Detection, Delay, Response and Army role) can be effective factors to reduce the attacks on Marib Power Plant. The validation of this framework was conducted in two ways: firstly by conducting an interview with experts in Marib Power Plant, and secondly by hypotheses testing between the components of the framework.
References
Weingart, S. 2000. Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defenses, in Cryptographic Hardware and Embedded Systems — CHES 2000. Ç. Koç and C. Paar, Editors. Springer Berlin Heidelberg. 302-317.
Lemke, K. 2006. Embedded Security: Physical Protection against Tampering Attacks, in Embedded Security in Cars, K. Lemke, C. Paar, and M. Wolf, Editors. 2006, Springer Berlin Heidelberg. 207-217.
Sakairi, M. 2011. Physical Security Technologies at Hitachi, in Computational Forensics, H. Sako, K. Franke, and S. Saitoh, Editors. Springer Berlin Heidelberg. 13-30.
Vacca, J. R. 2012. Computer and Information Security Handbook. Newnes.
Han, L., M. Ross, and T. Mack. 2010. Design of a Physical Security Perimeter Fencing System. In Security Technology (ICCST), 2010 IEEE International Carnahan Conference on.
Han, L., et al. 2009. Applying Decision Analysis Process to Exterior Physical Security System Technology Design and Selection. In Security Technology, 2009. 43rd Annual 2009 International Carnahan Conference on.
Yilin, M., et al. 2012. Cyber Physical Security of a Smart Grid Infrastructure. Proceedings of the IEEE. 100(1): 195-209.
Khiun Then, S. and M. Loosemore. 2006. Terrorism Prevention, Preparedness, and Response in Built Facilities. Facilities. 24(5/6): 157-176.
Lavy, S., J. A. Garcia, and M. K. Dixit. 2010. Establishment of KPIs for Facility Performance Measurement: Review of Literature. Facilities. 28(9/10): 440-464.
House, W. 2003. Critical Infrastructure Identification, Prioritization, and Protection. Homeland Security Presidential Directive/HSPD-7.
Gaston, E. and N. al-Dawsari. 2013. The Impact of Transition on Local Justice and Security In Yemen.
Fox, Y. 2012. Yemen Fox Newspaper.
Fox, Y. 2012. Electricity minister: Mareb Plant Stopped Due to Vandal Acts. News Paper-Yemen Fox.
Redwan. 2010. The Millions that Lose from the Citizens Electricity Yemen Help on the Inhibition of the Yemeni Economy Daily. News Paper-Alsaqer. http://www.yemen90.net/t9751-topic.
Maxim, P.S., Quantitative research methods in the social sciences. 1999: Oxford University Press New York, NY.
Kotrlik, J. and C. Higgins, Organizational research: Determining appropriate sample size in survey research appropriate sample size in survey research. Information technology, learning, and performance journal, 2001. 19(1): p. 43.
Leedy, P.D. and J.E. Ormrod, Practical research. Planning and design, 2005. 8.
Downloads
Issue
Section
License
Copyright of articles that appear in Jurnal Teknologi belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions, or any other reproductions of similar nature.