SlideShare a Scribd company logo
1 of 3
Download to read offline
Invention Journal of Research Technology in Engineering & Management (IJRTEM)
ISSN: 2455-3689
www.ijrtem.com Volume 2 Issue 2 ǁ February. 2018 ǁ PP 30-32
| Volume 2 | Issue 2 | www.ijrtem.com | 30 |
Security in The Chemical Industry
Matthew N. O. Sadiku1
, Sarhan M. Musa1
, and Osama M. Musa2
1
Roy G. Perry College of Engineering Prairie View A&M University Prairie View, TX 77446
2
Ashland Inc. Bridgewater, NJ 08807
ABSTRACT: The chemical industries face many of the same cybersecurity challenges that other industries
face. Since chemical industries handle large amounts of hazardous chemicals, they may be of interest to
terrorists. The security challenge facing chemical industries today is twofold: designing new systems that meet
cybersecurity standards and modifying or modernizing existing systems to meet cybersecurity requirements.
This paper provides a brief introduction to security issues in the chemical industry.
KEY WORDS: chemical industry, chemical security, cybersecurity
I. INTRODUCTION
The chemical industry consists of several industrial sectors, including production of chemicals, oil and gas, and
the pharmaceutical industry. It also includes manufacturing industries for paints, varnishes, soaps, detergents,
cosmetics, etc. The chemical industries manufacture chemical products that are critical to the life, health, and
well-being of people across the globe. They have thousands of facilities that use, manufacture, and store
chemicals, encompassing everything from petroleum refineries to pharmaceutical manufacturers to hardware
stores. They play an important role in the US economy by producing goods and services and employing citizens.
Because of their critical economic role and their responsibility to their employees and society, security is a top
priority.
The general consensus is that some US chemical facilities are vulnerable to terrorist attacks. In recognition of
the risks chemical industries pose, US Congress passed a rule known as Chemical Facility Anti-Terrorism
Standards (CFATS), which currently regulates all aspects of chemical security. The goal of CFATS is to secure
US chemical infrastructure against potential terrorist attacks [1]. As part of the overall strategy for preparing and
responding to terrorist attacks, chemical companies are encouraged to develop counterterrorism and security
protections. Cyber attacks are real; they come from various sources such as viruses, worms, trojans, hackers, a
disgruntled employee, or terrorists [2]. Cybersecurity is critical to the success of any chemical company; it
keeps chemical processes working safely and ensures that data is not compromised.
II. SECURITY
Security is being protected against the potential danger or loss that can result from the intentional acts of others.
It involves taking all preventive measures to avoid harmful incidents caused by unauthorized (internal or
external) persons who intend to seriously damage the company [3]. It is preventing intentional or unintentional
interference with the proper operation of industrial automation and control systems. Security and safety are
closely related concepts. Security is protecting a computer system against the threats of the external
environment, while safety is protecting the environment from potential dangers of a computer system [4]. Like
safety, security must be an integral part of any chemical process. Every company needs a security policy which
should be implemented in a proactive way and even be part of their mission statement. The company may also
need to have security countermeasures in place.
Cyber attacks are threatening the operation of businesses, banks, companies, and government networks. They
vary from illegal crime of individual citizen (hacking) to actions of groups (terrorists). Typical examples of
cyber attacks or threats include malware, phishing, denial-of-service attacks, social engineering attacks, and
man-in-the-middle attack. Cybersecurity is the process of protecting computer networks from cyber attacks or
unintended unauthorized access. The security objectives have been availability, authentication, confidentiality,
nonrepudiation, and integrity [5].
III. ACHIEVING SECURITY
There are several ways the chemical industry can enhance security. These include physical security
enhancement, protecting workers and the environment, regulation, and collaboration with others.
Security in The Chemical Industry.
| Volume 2 | Issue 2 | www.ijrtem.com | 31 |
• Physical security enhancement: Site security can be improved by “hardening” defenses so that sites would
be less vulnerable to terrorists. Protecting the chemical facilities, information regarding chemical formulas,
and customer databases, from potential cyber-attacks, is crucial. Building such a security culture within a
chemical plant, in addition to safety culture, may be essential for preventing unwanted intentional events.
• Protecting workers: Occupational Safety and Health Act (OSHA) has issued several standards designed to
protect workers. Employers must provide its employees with a workplace free from chemical hazard, which
is a set of circumstances that may result in harmful consequences. Each chemical industry must ensure that
workers, the public, and the environment are protected from unreasonable risk resulting from accidental and
intentional chemical releases. It may be necessary to train employees some specific skills such as
emergency response, bomb threats, hostage situation, first aid, etc.
• Regulation: Regulations should continue to require facilities to meet stringent security standards. To secure
chemical facilities, the federal government must provide regulatory certainty. The Department of Homeland
Security (DHS) should address this issue and ensure that all high-risk chemical facilities are safe, secure,
and fully comply with CFATS. A variety of federal policy options can be used for chemical security.
• Collaboration: Leaders in the chemical industry are stepping up efforts with an alliance previously formed,
the Chemical Sector Cyber Security Program (CSCSP), to maximize cyber-security. CSCSP was
established in 2002 and based in Arlington, Va. CSCSP hosts two general meetings each year. It is designed
to enhance cyber security throughout the chemical sector and develop strategies to protect people, property,
products, processes, information and information systems. Its mission is to develop a sector-wide strategy
to address cybersecurity issues and align the chemical industry’s priorities with those of DHS.
The CSCSP includes five key initiatives [6]: (1) fostering involvement and commitment across the sector; (2)
establishing a program to advocate the establishment of sector practices and policies; (3) establishing sector
practices and standards; (4) establishing an information sharing network; (5) and encouraging acceleration of
improved security technology and solutions development. To achieve its mission, the CSCSP needs partner with
business, industry, and vendors.
IV. CHALLENGES
There are several challenges in dealing with security issues in the chemical industry. Setting up a secure anti-
terrorism policy and security culture is costly. Security management needs to provide top management with
detailed security cost and benefits figures [7]. Because cybersecurity is not well-understood by non-experts, the
economics are hard to demonstrate, and effectiveness is difficult to measure. Wireless connection makes
industrial systems vulnerable to security intrusions. There is the shortage of cybersecurity professionals.
Cybersecurity policy lags technological innovation. Information technology changes rapidly, with security
technology and practices evolving even faster to keep pace with changing threats.
V. CONCLUSION
The chemical industry plays a vital role in the lifeline of our economy. Any disruption is likely to cause
significant damage both physically and financially. After the events of September 11, 2001, the chemical
industry, particularly chemical plants, realized the necessity for increased terrorism prevention. So far, there
have been few terrorist attacks on chemical facilities. Evidences of secure working environments are found in
almost every chemical plant. More information regarding chemical security can be obtained from the Security
Journal and the Journal of Applied Security Research, devoted exclusively for security-related issues.
REFERENCES
[1] A. A. Sadiq, “Chemical sector security: risks, vulnerabilities, and chemical industry representatives’
perspectives on CFATS,” Risk, Hazards & Crisis in Public Policy, vol. 4, no. 3, April 2014, pp. 164-
178.
[2] S. Bajpai and J. P. Gupta, “Site security for chemical process industries,” Journal of Loss Prevention in
the Process Industries, vol. 18, 2005, pp. 301–309.
[3] G. L.L. Reniers, “Security within the chemical process industry: survey results from Flanders,
Belgium,” Chemical Engineering Transactions, vol. 26, 2012, pp. 465-470.
[4] A. J. Kornecki and J. Zalewski, “Safety and security in industrial control,” Proceedings of the Sixth
Annual Workshop on Cyber Security and Information Intelligence Research, April 2010.
Security in The Chemical Industry.
| Volume 2 | Issue 2 | www.ijrtem.com | 32 |
[5] M. N. O. Sadiku, S. Alam, S. M. Musa, and C. M. Akujuobi, ”A Primer on Cybersecurity,”
International Journal of Advances in Scientific Research and Engineering, vol. 3, no. 8, Sept. 2017, pp.
71-74.
[6] “Chemical industry and IBM join forces to improve cyber-security,” false Business Wires, January
2003.
[7] G. Reniers, “Terrorism security in the chemical industry: Results of a qualitative investigation,”
Security Journal, vol. 24, no. 1, 2011, pp. 69–84.
AUTHORS
Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie
View A&M University, Prairie View, Texas. He is the author of several books and papers. His areas of research
interest include computational electromagnetics and computer networks. He is a fellow of IEEE.
Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M
University, Texas. He has been the director of Prairie View Networking Academy, Texas, since 2004. He is an
LTD Sprint and Boeing Welliver Fellow.
Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also
serves as a member of the Advisory Board at Manhattan College’s Department of Electrical and Computer
Engineering as well as a member of the Board of Trustees at Chemists' Club of NYC. Additionally, he sits on
the Advisory Board of the International Journal of Humanitarian Technology (IJHT).

More Related Content

What's hot

Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Enrique Martin
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Alexander SAMARIN
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Maurice Dawson
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramGoogleNewsSubmit
 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comNihal Peter Moraes
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber securityWGroup
 

What's hot (9)

Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3
 
Food Security
Food SecurityFood Security
Food Security
 
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
Unprepared for Cybersecurity in Saudi Arabia: Argument for a Shift Towards Cy...
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
A Major Revision of the CISRCP Program
A Major Revision of the CISRCP ProgramA Major Revision of the CISRCP Program
A Major Revision of the CISRCP Program
 
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.comMaritime Cybersecurity Developments maritimeoutlook.wordpress.com
Maritime Cybersecurity Developments maritimeoutlook.wordpress.com
 
Five principles for improving your cyber security
Five principles for improving your cyber securityFive principles for improving your cyber security
Five principles for improving your cyber security
 

Similar to Security in The Chemical Industry

Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical IndustryIJRTEMJOURNAL
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industryjournal ijrtem
 
Safety in The Chemical Industry
Safety in The Chemical IndustrySafety in The Chemical Industry
Safety in The Chemical Industryjournal ijrtem
 
Safety in The Chemical Industry
Safety in The Chemical IndustrySafety in The Chemical Industry
Safety in The Chemical IndustryIJRTEMJOURNAL
 
Safety in The Chemical Industry
Safety in The Chemical Industry	Safety in The Chemical Industry
Safety in The Chemical Industry journal ijrtem
 
Efficient Safety Culture as Sustainable Development in Construction Industry
Efficient Safety Culture as Sustainable Development in Construction IndustryEfficient Safety Culture as Sustainable Development in Construction Industry
Efficient Safety Culture as Sustainable Development in Construction IndustryIJERA Editor
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14James Nesbitt
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industryNumaan Huq
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperMicrosoft
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
Amelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projectsAmelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projectsIJERA Editor
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Securityijtsrd
 
A study about the status of implementation on safety standards and legal requ...
A study about the status of implementation on safety standards and legal requ...A study about the status of implementation on safety standards and legal requ...
A study about the status of implementation on safety standards and legal requ...VISHNU VIJAYAN
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxMargenePurnell14
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docxbagotjesusa
 

Similar to Security in The Chemical Industry (20)

Robots in The Chemical Industry
Robots in The Chemical IndustryRobots in The Chemical Industry
Robots in The Chemical Industry
 
Cybersecurity for Chemical Industry
Cybersecurity for Chemical IndustryCybersecurity for Chemical Industry
Cybersecurity for Chemical Industry
 
Safety in The Chemical Industry
Safety in The Chemical IndustrySafety in The Chemical Industry
Safety in The Chemical Industry
 
Safety in The Chemical Industry
Safety in The Chemical IndustrySafety in The Chemical Industry
Safety in The Chemical Industry
 
Safety in The Chemical Industry
Safety in The Chemical Industry	Safety in The Chemical Industry
Safety in The Chemical Industry
 
Efficient Safety Culture as Sustainable Development in Construction Industry
Efficient Safety Culture as Sustainable Development in Construction IndustryEfficient Safety Culture as Sustainable Development in Construction Industry
Efficient Safety Culture as Sustainable Development in Construction Industry
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 
[IJET V2I4P6] Authors:Miss Smita A. Bhole
[IJET V2I4P6] Authors:Miss Smita A. Bhole[IJET V2I4P6] Authors:Miss Smita A. Bhole
[IJET V2I4P6] Authors:Miss Smita A. Bhole
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
main.pptx
main.pptxmain.pptx
main.pptx
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
Amelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projectsAmelioration of safety management in infrastructure projects
Amelioration of safety management in infrastructure projects
 
Cyber Crime and Cyber Security
Cyber Crime and Cyber SecurityCyber Crime and Cyber Security
Cyber Crime and Cyber Security
 
A study about the status of implementation on safety standards and legal requ...
A study about the status of implementation on safety standards and legal requ...A study about the status of implementation on safety standards and legal requ...
A study about the status of implementation on safety standards and legal requ...
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docxINTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE  Walid.docx
INTERNATIONAL JOURNAL OF INFORMATION SECURITY SCIENCE Walid.docx
 

More from journal ijrtem

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...journal ijrtem
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...journal ijrtem
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...journal ijrtem
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0journal ijrtem
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERjournal ijrtem
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...journal ijrtem
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principlesjournal ijrtem
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management journal ijrtem
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...journal ijrtem
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomnessjournal ijrtem
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...journal ijrtem
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...journal ijrtem
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...journal ijrtem
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...journal ijrtem
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...journal ijrtem
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident journal ijrtem
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management journal ijrtem
 

More from journal ijrtem (20)

The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...The effect of functionalized carbon nanotubes on thermalmechanical performanc...
The effect of functionalized carbon nanotubes on thermalmechanical performanc...
 
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
Development Issues and Problems of Selected Agency in Sorsogon, An investigat...
 
Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...Positive and negative solutions of a boundary value problem for a fractional ...
Positive and negative solutions of a boundary value problem for a fractional ...
 
ORGANIC FOODS
ORGANIC FOODSORGANIC FOODS
ORGANIC FOODS
 
MOLECULAR COMPUTING
MOLECULAR COMPUTINGMOLECULAR COMPUTING
MOLECULAR COMPUTING
 
THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0THE ESSENCE OF INDUSTRY 4.0
THE ESSENCE OF INDUSTRY 4.0
 
GREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMERGREEN CHEMISTRY: A PRIMER
GREEN CHEMISTRY: A PRIMER
 
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
Rural Livelihood and Food Security: Insights from Srilanka Tapu of Sunsari Di...
 
Augmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design PrinciplesAugmented Tourism: Definitions and Design Principles
Augmented Tourism: Definitions and Design Principles
 
A study on financial aspect of supply chain management
A study on financial aspect of supply chain management	A study on financial aspect of supply chain management
A study on financial aspect of supply chain management
 
Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...Existence results for fractional q-differential equations with integral and m...
Existence results for fractional q-differential equations with integral and m...
 
Multi products storage using randomness
Multi products storage using randomnessMulti products storage using randomness
Multi products storage using randomness
 
Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...Study of desalination processes of seawater from the desalination plant of La...
Study of desalination processes of seawater from the desalination plant of La...
 
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...Effect of Cash Management on The Financial Performance of Cooperative Banks i...
Effect of Cash Management on The Financial Performance of Cooperative Banks i...
 
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
Technical expertise on the cause of engine failure of the Mitsubishi Pajero S...
 
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...Clustering based Time Slot Assignment Protocol for Improving Performance in U...
Clustering based Time Slot Assignment Protocol for Improving Performance in U...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
Assessment of the Water Quality of Lake Sidi Boughaba (Ramsar Site 1980) Keni...
 
The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident	The case of a cyclist and tractor traffic accident
The case of a cyclist and tractor traffic accident
 
A Smart Approach for Traffic Management
A Smart Approach for Traffic Management	A Smart Approach for Traffic Management
A Smart Approach for Traffic Management
 

Recently uploaded

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...ranjana rawat
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
(TARA) Talegaon Dabhade Call Girls Just Call 7001035870 [ Cash on Delivery ] ...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 

Security in The Chemical Industry

  • 1. Invention Journal of Research Technology in Engineering & Management (IJRTEM) ISSN: 2455-3689 www.ijrtem.com Volume 2 Issue 2 ǁ February. 2018 ǁ PP 30-32 | Volume 2 | Issue 2 | www.ijrtem.com | 30 | Security in The Chemical Industry Matthew N. O. Sadiku1 , Sarhan M. Musa1 , and Osama M. Musa2 1 Roy G. Perry College of Engineering Prairie View A&M University Prairie View, TX 77446 2 Ashland Inc. Bridgewater, NJ 08807 ABSTRACT: The chemical industries face many of the same cybersecurity challenges that other industries face. Since chemical industries handle large amounts of hazardous chemicals, they may be of interest to terrorists. The security challenge facing chemical industries today is twofold: designing new systems that meet cybersecurity standards and modifying or modernizing existing systems to meet cybersecurity requirements. This paper provides a brief introduction to security issues in the chemical industry. KEY WORDS: chemical industry, chemical security, cybersecurity I. INTRODUCTION The chemical industry consists of several industrial sectors, including production of chemicals, oil and gas, and the pharmaceutical industry. It also includes manufacturing industries for paints, varnishes, soaps, detergents, cosmetics, etc. The chemical industries manufacture chemical products that are critical to the life, health, and well-being of people across the globe. They have thousands of facilities that use, manufacture, and store chemicals, encompassing everything from petroleum refineries to pharmaceutical manufacturers to hardware stores. They play an important role in the US economy by producing goods and services and employing citizens. Because of their critical economic role and their responsibility to their employees and society, security is a top priority. The general consensus is that some US chemical facilities are vulnerable to terrorist attacks. In recognition of the risks chemical industries pose, US Congress passed a rule known as Chemical Facility Anti-Terrorism Standards (CFATS), which currently regulates all aspects of chemical security. The goal of CFATS is to secure US chemical infrastructure against potential terrorist attacks [1]. As part of the overall strategy for preparing and responding to terrorist attacks, chemical companies are encouraged to develop counterterrorism and security protections. Cyber attacks are real; they come from various sources such as viruses, worms, trojans, hackers, a disgruntled employee, or terrorists [2]. Cybersecurity is critical to the success of any chemical company; it keeps chemical processes working safely and ensures that data is not compromised. II. SECURITY Security is being protected against the potential danger or loss that can result from the intentional acts of others. It involves taking all preventive measures to avoid harmful incidents caused by unauthorized (internal or external) persons who intend to seriously damage the company [3]. It is preventing intentional or unintentional interference with the proper operation of industrial automation and control systems. Security and safety are closely related concepts. Security is protecting a computer system against the threats of the external environment, while safety is protecting the environment from potential dangers of a computer system [4]. Like safety, security must be an integral part of any chemical process. Every company needs a security policy which should be implemented in a proactive way and even be part of their mission statement. The company may also need to have security countermeasures in place. Cyber attacks are threatening the operation of businesses, banks, companies, and government networks. They vary from illegal crime of individual citizen (hacking) to actions of groups (terrorists). Typical examples of cyber attacks or threats include malware, phishing, denial-of-service attacks, social engineering attacks, and man-in-the-middle attack. Cybersecurity is the process of protecting computer networks from cyber attacks or unintended unauthorized access. The security objectives have been availability, authentication, confidentiality, nonrepudiation, and integrity [5]. III. ACHIEVING SECURITY There are several ways the chemical industry can enhance security. These include physical security enhancement, protecting workers and the environment, regulation, and collaboration with others.
  • 2. Security in The Chemical Industry. | Volume 2 | Issue 2 | www.ijrtem.com | 31 | • Physical security enhancement: Site security can be improved by “hardening” defenses so that sites would be less vulnerable to terrorists. Protecting the chemical facilities, information regarding chemical formulas, and customer databases, from potential cyber-attacks, is crucial. Building such a security culture within a chemical plant, in addition to safety culture, may be essential for preventing unwanted intentional events. • Protecting workers: Occupational Safety and Health Act (OSHA) has issued several standards designed to protect workers. Employers must provide its employees with a workplace free from chemical hazard, which is a set of circumstances that may result in harmful consequences. Each chemical industry must ensure that workers, the public, and the environment are protected from unreasonable risk resulting from accidental and intentional chemical releases. It may be necessary to train employees some specific skills such as emergency response, bomb threats, hostage situation, first aid, etc. • Regulation: Regulations should continue to require facilities to meet stringent security standards. To secure chemical facilities, the federal government must provide regulatory certainty. The Department of Homeland Security (DHS) should address this issue and ensure that all high-risk chemical facilities are safe, secure, and fully comply with CFATS. A variety of federal policy options can be used for chemical security. • Collaboration: Leaders in the chemical industry are stepping up efforts with an alliance previously formed, the Chemical Sector Cyber Security Program (CSCSP), to maximize cyber-security. CSCSP was established in 2002 and based in Arlington, Va. CSCSP hosts two general meetings each year. It is designed to enhance cyber security throughout the chemical sector and develop strategies to protect people, property, products, processes, information and information systems. Its mission is to develop a sector-wide strategy to address cybersecurity issues and align the chemical industry’s priorities with those of DHS. The CSCSP includes five key initiatives [6]: (1) fostering involvement and commitment across the sector; (2) establishing a program to advocate the establishment of sector practices and policies; (3) establishing sector practices and standards; (4) establishing an information sharing network; (5) and encouraging acceleration of improved security technology and solutions development. To achieve its mission, the CSCSP needs partner with business, industry, and vendors. IV. CHALLENGES There are several challenges in dealing with security issues in the chemical industry. Setting up a secure anti- terrorism policy and security culture is costly. Security management needs to provide top management with detailed security cost and benefits figures [7]. Because cybersecurity is not well-understood by non-experts, the economics are hard to demonstrate, and effectiveness is difficult to measure. Wireless connection makes industrial systems vulnerable to security intrusions. There is the shortage of cybersecurity professionals. Cybersecurity policy lags technological innovation. Information technology changes rapidly, with security technology and practices evolving even faster to keep pace with changing threats. V. CONCLUSION The chemical industry plays a vital role in the lifeline of our economy. Any disruption is likely to cause significant damage both physically and financially. After the events of September 11, 2001, the chemical industry, particularly chemical plants, realized the necessity for increased terrorism prevention. So far, there have been few terrorist attacks on chemical facilities. Evidences of secure working environments are found in almost every chemical plant. More information regarding chemical security can be obtained from the Security Journal and the Journal of Applied Security Research, devoted exclusively for security-related issues. REFERENCES [1] A. A. Sadiq, “Chemical sector security: risks, vulnerabilities, and chemical industry representatives’ perspectives on CFATS,” Risk, Hazards & Crisis in Public Policy, vol. 4, no. 3, April 2014, pp. 164- 178. [2] S. Bajpai and J. P. Gupta, “Site security for chemical process industries,” Journal of Loss Prevention in the Process Industries, vol. 18, 2005, pp. 301–309. [3] G. L.L. Reniers, “Security within the chemical process industry: survey results from Flanders, Belgium,” Chemical Engineering Transactions, vol. 26, 2012, pp. 465-470. [4] A. J. Kornecki and J. Zalewski, “Safety and security in industrial control,” Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, April 2010.
  • 3. Security in The Chemical Industry. | Volume 2 | Issue 2 | www.ijrtem.com | 32 | [5] M. N. O. Sadiku, S. Alam, S. M. Musa, and C. M. Akujuobi, ”A Primer on Cybersecurity,” International Journal of Advances in Scientific Research and Engineering, vol. 3, no. 8, Sept. 2017, pp. 71-74. [6] “Chemical industry and IBM join forces to improve cyber-security,” false Business Wires, January 2003. [7] G. Reniers, “Terrorism security in the chemical industry: Results of a qualitative investigation,” Security Journal, vol. 24, no. 1, 2011, pp. 69–84. AUTHORS Matthew N.O. Sadiku is a professor in the Department of Electrical and Computer Engineering at Prairie View A&M University, Prairie View, Texas. He is the author of several books and papers. His areas of research interest include computational electromagnetics and computer networks. He is a fellow of IEEE. Sarhan M. Musa is a professor in the Department of Engineering Technology at Prairie View A&M University, Texas. He has been the director of Prairie View Networking Academy, Texas, since 2004. He is an LTD Sprint and Boeing Welliver Fellow. Osama M. Musa is currently Vice President and Chief Technology Officer for Ashland Inc. Dr. Musa also serves as a member of the Advisory Board at Manhattan College’s Department of Electrical and Computer Engineering as well as a member of the Board of Trustees at Chemists' Club of NYC. Additionally, he sits on the Advisory Board of the International Journal of Humanitarian Technology (IJHT).