Which centralised security system is the most secure?

A centralised system like a government-run bank or a centralised national energy provider is more likely to be more secure than one with a mix of competing technologies and technology options.

A mix of technologies is an area that has been under scrutiny by regulators in recent years. 

A centralised energy provider like a power grid provider or an electricity market provider would likely be more vulnerable to cyber attacks and data breaches.

But that is because of the fact that it is more centralized.

And it is easier to take over a power distribution company than it is to take control of a power network. 

The Central Bank of South Africa (BCSA) has set up a Cyber Security Advisory Committee to assess the security of its systems.

It is a five-member panel which includes three experts, a cyber security expert and a government adviser. 

“There are different levels of security and I think what is interesting is that you see a lot of people who are experts and who are very well-versed in these issues, but they are not the most skilled cyber experts,” says Dr Gautam Patel, an expert on cyber security at the University of Cape Town. 

Banks are required to have at least three cyber security experts and three other professionals who work independently, which means the panel is limited in what it can say. 

But some people are convinced that a centralisation of control over energy networks is not the way forward. 

Professor Jethro Mzungu, a researcher at the Central Bank, has said that there are advantages to a centralized energy system. 

Dr Patel believes that decentralised energy providers are better equipped to handle cyber attacks because they have a much larger number of experts to help them. 

Some analysts have suggested that the BCSA has not been as vigilant about protecting its systems as the banks. 

However, the BCSAs panel does acknowledge that the security systems are vulnerable to outside attacks. 

What are the risks to centralised systems? 

The most significant security risks to centralized energy systems are the fact there are more people involved in the decision-making process and there is less trust in the power systems and energy providers. 

Centralised systems also have a greater capacity to respond to cyber threats and the threat of cyber attacks.

A central energy provider might be able to recover from a cyber attack but the risks are much greater for the government. 

There are also security risks with decentralised systems that are more likely because they rely on the internet and more centralized data, which has to be stored and shared. 

Why are centralised power systems vulnerable? 

Power networks are not immune to cyberattacks because they are a system where information is passed from person to person.

The BCSAs panel said that decentralisation of power systems was a problem that needed to be addressed. 

According to Professor Patel, decentralised power networks can be vulnerable to a range of cyber threats including network intrusions, hacking attacks, malware attacks and cyber-attacks directed against a central power. 

Is there a safe level of decentralisation? 

If centralised grids are vulnerable, they can be made more resilient by decentralising power infrastructure, which is a central component of a central electricity network.

There is a debate about whether centralised electric grids can be decentralized. 

In a world where centralised control of power is increasingly needed, decentralisation is more important than ever. 

How would you go about decentralising a power system? 

It is likely that you will need to build a range the amount of decentralised control you want to give to a power provider.

You can decentralise the grid by creating more distributed power generation, which involves using solar panels to provide power to the grid, or by creating a distributed network.

These distributed networks could be made by decentralised companies, such as community owned energy providers, which would provide power and supply to customers, and by other local power producers. 

For more information, read our Cyber Security blog.