Page 42 - CE_Industral_Journal_2014
P. 42

Design  requirements  for  equipment  used  in  harsh   set of required controls to physically protect critical assets
        environments are more rigorous than that of commercial   and  the  compliance  specifically  calls  out  for  physical
        grade equipment and while technology that is not designed   access control and monitoring physical access. Video can
        for the substation may work initially, over time and under   be integrated with other physical security devices, such
        stress from the conditions present in the substation, will   as access control, to provide a comprehensive physical
        eventually prove unreliable and likely fail.            security strategy both for NERC and general utility security.

        VIDEO MONITORING APPLICATIONS                           B.  Asset Monitoring and Substation Automation
        Video  monitoring  solutions  are  playing  an  increasing   Video  monitoring  can  be  incorporated  in  an  automated
        role  in  addressing  the  operational  challenges  faced  by   fashion to improve the efficiency and reliability of the utility
        electric  utilities.  In  particular,  remote  video  monitoring  is   operations.  Continuous  and  automatic  remote  asset
        an area which might have been unfeasible years ago, but   monitoring of critical substation components can provide
        which can now be facilitated through the newly deployed   an early warning of impending equipment failures. Video
        communications infrastructure that exists (or soon will exist)   can help increase reliability without adding personnel, it
        within a substation and between substations. In addition,   can  reduce  the  chance  for  failures  and  downtime,  and
        newer  video  monitoring  technologies  and  features  are   it  can  extend  the  lifecycle  of  assets  through  preventive
        able  to  effectively  leverage  existing  communications   maintenance.  The  cost  of  protecting  the  utility’s  critical
        infrastructure.                                         assets is negligible as compared to the cost of the asset
                                                                itself.
        Besides  being  an  integral  part  of  a  physical  security
        strategy, video monitoring can be used in a wide range of   For  example,  intelligent  video  monitoring  systems  that
        applications related to asset management and substation   utilize  thermal  cameras  enables  automatic  detection  of
        automation. Video monitoring is opening up new ways to   temperature increases in substation equipment. Thermal
        improve the operations and reliability of the grid.     signatures  are  analyzed  and  used  as  precursors  to
                                                                equipment failures. These intelligent systems incorporate
        A.  Security                                            sophisticated video analytics algorithms for smart detection
                                                                of  anomalies.  “Thermal  rules”  can  be  implemented  to
        Video monitoring plays an important role in preventing and   trigger automated alarm and email notification of possible
        investigating  various  types  of  security  threats  including   issues.  With  the  cost  of  thermal  camera  coming  down
        theft, unauthorized access, vandalism, sabotage, terrorism   dramatically in recent years, automated thermal analysis
        or  other  damage  to  the  critical  infrastructure.  Security   has  become  more  cost  effective  and  its  utilization  has
        threats at remote facilities have increased in recent years   become a new and effective tool for substation automation
        with theft of copper, and other high value metal electrical   and preventive maintenance functions.
        components,  emerging  as  a  key  operational  issue  for
        many  utilities,  as  unmanned  remotes  sites  provide  an   Currently  SCADA  systems  present  a  graphical  display
        easy target for thieves. Additionally, theft intrusions have   of  what  is  essentially  an  electrical  representation  of  the
        also contributed to substantial substation physical asset   power system and the flow of power.  Integrating video
        damage. While protection of critical infrastructure against   into SCADA systems that are used to monitor and control
        security threats is of utmost importance, theft of material   an electric utility’s operation is the next logical progression
        and assets poses an immediate economic loss and is the   for SCADA. Video within SCADA systems is about making
        more likely occurrence for an electric utility operator.  key components of the operation visible. Adding real-time
                                                                video to HMIs provides enhanced understanding above
        Intelligent video monitoring systems can automatically and   and beyond what can be obtained by looking at graphical
        pro-actively alert personnel of an intrusion, allowing for the   representations  and  numerical  readouts.  In  particular,
        dispatch of security personnel to thwart any attempt to   video allows for visual confirmation of events or issues and
        steal materials. Monitoring systems also provide a means   is  particularly  useful  when  personnel  safety  is  involved,
        of  recording  an  incident  that  will  allow  investigators  an   such as visually verifying that a breaker is open or closed
        opportunity to determine who perpetrated the crime after   before an operator enters an area.
        the fact.

        Video monitoring is also an important tool for regulatory   VIDEO  MONITORING  SOLUTIONS  FOR  ELECTRIC
        compliance  and  implementing  video  has  become  a    UTILITIES
        necessary security practices to meet these regulations. For   A  typical  video  monitoring  system  utilizes  components
        example, the NERC physical security standard outlines a   such  as  cameras,  video  recorders,  servers,  networking

        INDUSTRY JOURNAL 40
   37   38   39   40   41   42   43   44   45   46   47