Left: Even more robust biometrics will emerge in time and we will work in environments that are controlled without us even knowing security checkpoints are in place Source: The KC Group
risk unintentionally exposing them to unauthorised individuals, such as contractors, visitors, or external attackers. Access cards, for example, are designed to limit entry
to restricted physical locations. When shared, this creates opportunities for sabotage, theft, or even corporate espionage. Likewise, shared passwords can lead to unauthorised
entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers
gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon bottom line, operations, reputation and for the civil nuclear sector, the safety of personnel and civilians. One well known reported example of human error
occurred in 1979, when David Learned Dale, a contracted laboratory technician at a General Electric fuel-fabrication facility in Wilmington, North Carolina in the United States, decided to demonstrate how an insider can test security systems by stealing low-enriched uranium (LEU). Security guards failed to notice that the identification
card presented was not an authorised access card, but in fact his drivers’ licence, and Dale was able to access restricted areas, bypass a faulty locking mechanism and leave the facility in a one-hour window, before embarking upon a failed extortion attempt.
Efforts to improve the human element A Taylor & Francis report of 2022, ‘Exploring the human dimension of nuclear security: the history, theory, and practice of security culture’, examines security culture across several nuclear sites within the United Kingdom, over a number of decades. In line with IAEA guidelines, it concludes that while
nuclear security has progressed less quickly than it has in nuclear safety – driven partly by the aftermath of disasters such as Chornobyl – “International efforts to promote the importance of nuclear-security culture at the operational level are now gaining momentum, with an upsurge over the past decade in initiatives aimed at understanding and strengthening the human factor and placing greater emphasis on the active involvement of all personnel in security”.
While data breaches court most news headlines in this digital era, some of the most significant security risks
are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. It is therefore important to mitigate human risk at an operational level. One way to prevent human error, or to thwart malpractice
is to reduce the burden upon employees to be compliant, and eliminate human flaws, is by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now,
despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but allows instant recognition of persons of interest cross-referenced against a database of known suspects. Car parks are typically governed by ANPR to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend individuals if required. Smart, cloud-based technology being used by governments and law enforcement authorities have cascaded down through the civil and corporate worlds. For critical national infrastructure (CNI) sites, like nuclear power plants, the key question is the potential cost of a security breach. Security conscious organisations are now diligently removing human error, by eliminating the human burden. With cloud managed software not only are access points managed through biometric integration, but it also overcomes the issues around accountability – the cloud will always register who has passed through an access point, or out of it.
This is critical for both immediate safety and security
but also for matters arising from a crisis, or emergency situation. It’s also less admin heavy, more cost effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Simple acts of negligence, such as sharing passwords
or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of nuclear, national security risks. To mitigate this, organisations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves even more robust biometrics will come to the fore, and we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet. ■
www.neimagazine.com | February 2025 | 27
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61