City Power Electricity Network Infrastructure Overview
City Power, wholly-owned by the City of Johannesburg, aims to provide a reliable energy supply. The infrastructure faces various risks and security threats, including breaches, theft, vandalism, and cyber threats in different asset categories. Challenges such as inadequate physical security barriers, monitoring, response teams, and maintenance are highlighted. The need for improved security technology and measures is evident to safeguard the electricity network infrastructure effectively.
Download Presentation
Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
E N D
Presentation Transcript
CITY POWER ELECTRICITY NETWORK INFRASTRUCTURE 15 September 2021
CONTENT PAGE 1 Strategic Overview 2 Threat Risk Profile & Security Technology 3 City Power Five Pillar Approach Conclusion 4
STRATEGIC OVERVIEW City Power - wholly-owned by the City of Johannesburg Mandate - to provide a reliable supply of energy to the City of Johannesburg 3
Threat Risk Profile & Security Technology Asset Category Risks Security Technology Bulk Intake Substations Breach of Perimeter barriers Damage to or Theft of critical copper equipment Tampering with critical components (protection relays/ wires) Cyber security threats by tampering with Remote Terminal Units (RTUs) linked to SCADA Integrated security systems (CCTV, Intruder detection, access control). However systems undermined by: Inadequate physical security barriers Inadequate monitoring and response teams Maintenance, repairs & up-time Insider threats Criminals sophistication Over Head Transmission Lines & Pylons Theft of pylon cross members weaken pylon structures Encroachment & erection of dwellings on servitudes decaying of foundations structures due to soil erosion tree encroachment & vegetation overgrowth Illegal dumping. Pylon Vibration Alarms. Proved Ineffective due to: Topographical features impede access Inadequate monitoring & response Lack of illumination undermine response effectiveness Maintenance and repairs Major Substations Breach of Perimeter barriers Damage to or Theft of critical copper equipment Tampering with critical components (protection relays/ wires) Cyber security threats by tampering with Remote Terminal Units (RTUs) linked to SCADA Limited Integrated security systems (CCTV, Intruder detection, access control). Effectiveness hampered by: Inadequate physical security barriers Inadequate monitoring and response teams Maintenance, repairs & up-time Insider threats Criminals sophistication 4
Threat Risk Profile & Security Technology Asset Category Risks Security Technology Underground Inner-City Tunnels Breach of manhole covers & Concrete Barriers Theft of critical copper equipment Fires extensive damage due to confinement Limited Integrated Security Systems Man-hole alarms & electronic locking system Challenges: Environmental degradation maintenance & repairs Inadequate monitoring and response Insider threats Criminals sophistications Load Centres Theft of often copper components, fuses, busbars Theft of full MSS s & Transformers Vandalism Illegal connections Public safety issues (electrocutions) Perpetrators have perfect knowledge of network Limited electronic access control and intruder detection systems (4-level access - via access cards, remote access, bypass key & master key) Challenges: Slow recapitalization from old load centres to new generation Incompatible technologies Underground Cables Extensive dispersal & remote location Topographically induced vulnerabilities Extensive Cable theft various hotspots Mining of redundant cables Collaboration with illegal mining & foreign nationals Replace copper cable with aluminium Factory-installed identification barcode No real-time systems to detect incidents 5
Threat Risk Profile & Security Technology. Asset Category Risks Security Technology Meters & Protective Structures Theft/ Damage Tampering/ bypass, bridging Illegal connection Illegal reconnection after cut-offs Protective structures with electronic access control & intruder detection systems Challenges: limited back office & hosting infrastructure No real-time monitoring and management Repair and maintenance Smart meters Challenges: Limited monitoring and real-time response to tamper detection Street Lights Malicious damage to street poles Theft of Ariel bundle cable for illegal connection No security technology 6
CITY POWER - FIVE PILLAR APPROACH Reinforce barriers (Deter/Delay/Deny/Deflect) Physical Security Security Technology CCTV, Access system, IDS (Detection) Static & mobile security personnel (Response & Contain) Security Personnel Intelligence-driven crime combat, investigation & prosecution Intelligence Operations Adopt network at local level: MOU developed Various community structures engaged and keen to collaborate Partnership with community structures 7
CONCLUSION City Power areas of interests iro Security Technology : Protection of Pylons and Overhead Transmission Lines Bulk, Major and Switching Stations Underground Tunnels (incl. Manhole security technology) Miniature Substations (MSSs) Underground Copper cables Street lights & Ariel bundle network Meters and protective kiosks 8