Hungarian Defence Review 2020, Nr. 1.
42HDR 2020, Nr. 1• Finance (banking, securities, and investment);• Health care;• Food;• Water (dams, storage, treatment, and networks);• Transport (airports, ports, intermodal facilities, railway and mass transit networks, andtraffic control systems);• Production, storage and transport of dangerous goods (e.g., Chemical, biological, radiologicaland nuclear materials);• Government (e.g., Critical services, facilities, information networks, assets, and key nationalsites and monuments). 3In this review, both military and political aspects are relevant in order to understand thesensitivity of the water sharing issue and the dispute between Ethiopia and Egypt.RISK ELEMENTS IN CONNECTION WITH CRITICALINFRASTRUCTURESFrom the aspects of critical infrastructure protection, there are different elements that affectthe security of critical infrastructures. These elements are:• double dependency;• special operating environment;• location;• domino effects;• information security;• IT security.Double dependency: Critical infrastructures are complex systems, and there is a significantoperating dependency between the various infrastructures; furthermore, there is adependency between critical infrastructure and society, as well.Another risk element is the special operating environment because the operating of acritical infrastructure itself is a high-risk activity.The location of critical infrastructures is also an important factor because human activities(such as wars and armed conflicts) or natural disasters (like hurricanes and floods) alsoaffect the operation and the safety of critical infrastructures.There are other factors that threaten critical infrastructures, for example, the above-mentioneddomino effect. In the proper sense, the domino effect is a chain reaction, becausethe operation of critical infrastructures consists of complex and depending systems. If onecritical infrastructure has any error, it could lead to a breakdown in other infrastructures, too.Nowadays, information security and IT security are essential with regard to critical infrastructureprotection. There is some vital and sensitive information that is cardinal in connectionwith safe operation. In our days, IT security is as important as physical security. Inthe 21 st century, a cyberattack could also be as destructive and dangerous as a physical one.3 “Communication from the Commission to the Council and the European Parliament: Critical InfrastructureProtection in the fight against terrorism: COM/2004/0702”.
Security Studies43In short, safety and security comprise evidently one of the most significant factors in theoperation of critical infrastructures. 4A HISTORICAL EXAMPLEThroughout history, it has occurred several times that an enemy attacked the critical infrastructureof another enemy or group in order to cause serious damage. Various cyber andphysical attacks and sabotage actions have been carried out against diverse critical infrastructures.The results of these kinds of attacks are malfunction and damage; besides, theycause panic and fear in societies, especially in the affected territories, and critical infrastructurescould be targets not only of state actors but also of terrorists.In the 20 th century, this kind of attack was relatively well documented. It is important tohighlight the attacks against dams.One of the most significant attacks happened during the Second World War. In Operation“Chastise” during the night of 16-17 May 1943, the British Royal Air Force destroyed threedams in the Ruhr valley, the territory of which was the heartland of the German industry.The Ruhr valley had significant relevance in the German war industry. On the one hand,the water in the reservoir used to generate electricity, and on the other hand, it played acrucial role in the German war industry. The British Royal Air Force developed a special“bouncing” bomb for this purpose, which was able to destroy the dams. The British RoyalAir Force targeted three dams, namely the Möhne, Eder, and Sorpe dams. The dams wereburst, and it caused catastrophic floods in the Ruhr valley, and several villages were destroyed.Around 1,600 civilians lost their lives as a result of the attack on the dams. 5THE IMPORTANCE OF HYDROELECTRIC POWER PLANTSFOR ETHIOPIAFor Ethiopia, the hydroelectric power plant is of paramount importance. The country’s populationis currently around 107 million people, which increases by 2.3% per year. 6The country is one of Africa’s fastest-growing economies. 7In order to maintain its economic performance, the country’s energy demand is increasing.As a result of the economic growth, between 2002 and 2006 electricity demand increasedby 13% annually, while today it increases by approx. 20%. 8In order to cover this level of demand/growth, investments, such as the Grand RenaissanceDam are needed. The determination is shown by the fact that the dam is planned to4 Bonnyai T. “A kritikus infrastruktúra védelem elemzése a lakosságfelkészítés tükrében”. PhD thesis. Budapest:National University of Public Service, 2014. 22-255 Mason A. “The incredible story of the dambusters raid”. Imperial War Museums. 5 Jan 2018. https://www.iwm.org.uk/history/the-incredible-story-of-the-dambusters-raid, Accessed on 30 Jul 2019.6 “Ethiopia population”. Worldometers. http://www.worldometers.info/world-population/ethiopia-population/.Accessed on 30 Jul 2019.7 Monteiro A. and Thukwana, N. “IMF sees Ethiopia beating Ghana as fastest-growing Africa economy”.Bloomberg. 17 Apr 2018. https://www.bloomberg.com/news/articles/2018-04-17/ethiopia-pips-ghana-as-africa-s-fastest-growing-economy-for-imf,Accessed on 30 Jul 2019.8 Mondal H. A. et al. “Ethiopian energy status and demand scenarios: prospects to improve energy efficiency andmitigate GHG emissions”. Energy 149. 2018. 161-172. DOI:10.1016/j.energy.2018.02.067
- Page 1 and 2: HungarianDefenceReviewSPECIAL ISSUE
- Page 3 and 4: HungarianDefenceReviewSPECIALISSUE
- Page 5 and 6: Foreword3FOREWORDThis year we can s
- Page 7 and 8: Focus5Blockchain is clearly a disru
- Page 9 and 10: Focus7the distributed ledger system
- Page 11 and 12: Focus9chain). If the consensus prot
- Page 13 and 14: Focus11made sensational by the nove
- Page 15 and 16: Focus13ones. As a result, blockchai
- Page 17 and 18: HDR 2020, Nr. 1, 15-40. Security St
- Page 19 and 20: Security Studies17could be counter
- Page 21 and 22: Security Studies19secret service in
- Page 23 and 24: Security Studies21without hierarchy
- Page 25 and 26: Security Studies23Regions, as parts
- Page 27 and 28: Security Studies25teach in the firs
- Page 29 and 30: Security Studies27was also a major
- Page 31 and 32: Security Studies29The withdrawal wa
- Page 33 and 34: Security Studies31the next chapter,
- Page 35 and 36: Security Studies33violations agains
- Page 37 and 38: Security Studies35VI. CONCLUSION -
- Page 39 and 40: Security Studies37Behlewî, D. “S
- Page 41 and 42: Security Studies39“Persecution an
- Page 43: HDR 2020, Nr. 1, 41-49. Security St
- Page 47 and 48: Security Studies45The historical re
- Page 49 and 50: Security Studies47investment in Eth
- Page 51 and 52: Security Studies49Havasi, Zs. “En
- Page 53 and 54: Security Studies51EXTRAORDINARY LOA
- Page 55 and 56: Security Studies53Figure 3 Testing
- Page 57 and 58: Security Studies55Figure 6 Numerica
- Page 59 and 60: Training57According to Báthory and
- Page 61 and 62: Training59• Obligation: activitie
- Page 63 and 64: Training61In budō, the most import
- Page 65 and 66: Training63standing and mastering of
- Page 67 and 68: Training65Stages Ages Basicconflict
- Page 69 and 70: Training67and ability with the grea
- Page 71 and 72: HDR 2020, Nr. 1, 69-78. Forum & Rev
- Page 73 and 74: Forum & Reviews71the combined appli
- Page 75 and 76: Forum & Reviews73Did the air count
- Page 77 and 78: Forum & Reviews75NATO’s cyber and
- Page 79 and 80: Forum & Reviews77the Alliance than
- Page 81 and 82: HDR 2020, Nr. 1, 79-85. Forum & Rev
- Page 83 and 84: Forum & Reviews81analyze the major
- Page 85 and 86: Forum & Reviews83platforms that alr
- Page 87 and 88: Forum & Reviews85example, adding ne
- Page 89 and 90: Forum & Reviews87“The Military Hi
- Page 91 and 92: Forum & Reviews89well documented pu
- Page 93 and 94: About the Authors91ABOUT THE AUTHOR
42
HDR 2020, Nr. 1
• Finance (banking, securities, and investment);
• Health care;
• Food;
• Water (dams, storage, treatment, and networks);
• Transport (airports, ports, intermodal facilities, railway and mass transit networks, and
traffic control systems);
• Production, storage and transport of dangerous goods (e.g., Chemical, biological, radiological
and nuclear materials);
• Government (e.g., Critical services, facilities, information networks, assets, and key national
sites and monuments). 3
In this review, both military and political aspects are relevant in order to understand the
sensitivity of the water sharing issue and the dispute between Ethiopia and Egypt.
RISK ELEMENTS IN CONNECTION WITH CRITICAL
INFRASTRUCTURES
From the aspects of critical infrastructure protection, there are different elements that affect
the security of critical infrastructures. These elements are:
• double dependency;
• special operating environment;
• location;
• domino effects;
• information security;
• IT security.
Double dependency: Critical infrastructures are complex systems, and there is a significant
operating dependency between the various infrastructures; furthermore, there is a
dependency between critical infrastructure and society, as well.
Another risk element is the special operating environment because the operating of a
critical infrastructure itself is a high-risk activity.
The location of critical infrastructures is also an important factor because human activities
(such as wars and armed conflicts) or natural disasters (like hurricanes and floods) also
affect the operation and the safety of critical infrastructures.
There are other factors that threaten critical infrastructures, for example, the above-mentioned
domino effect. In the proper sense, the domino effect is a chain reaction, because
the operation of critical infrastructures consists of complex and depending systems. If one
critical infrastructure has any error, it could lead to a breakdown in other infrastructures, too.
Nowadays, information security and IT security are essential with regard to critical infrastructure
protection. There is some vital and sensitive information that is cardinal in connection
with safe operation. In our days, IT security is as important as physical security. In
the 21 st century, a cyberattack could also be as destructive and dangerous as a physical one.
3 “Communication from the Commission to the Council and the European Parliament: Critical Infrastructure
Protection in the fight against terrorism: COM/2004/0702”.