Skip to main content Accessibility help
×
Hostname: page-component-54dcc4c588-b5cpw Total loading time: 0 Render date: 2025-10-01T23:09:13.983Z Has data issue: false hasContentIssue false

Chapter XIV - Cybersecurity in the European Electricity System: The Role of the NIS2 Directive

Published online by Cambridge University Press:  24 September 2025

Get access

Summary

INTRODUCTION

The electricity system is undergoing a double transition: rapid decarbonisation and increasing digitalisation. These two transitions are intimately linked. The supply and demand of electricity must be balanced at all times, but the growing share of renewable energy technologies, with complex and intermittent generation patterns, means that this task can only be performed through digital processes. Digitalisation is thus a precondition for the operation of the future decarbonised electricity grid. However, the digitalisation of the electricity grid also renders it more vulnerable to cyberattacks. A cyberattack on the electricity system could cause significant economic damage. In the worst-case scenario, it could lead to prolonged power outages, causing widespread disruption, and putting human lives at risk. While the EU's electricity system has not yet been hit by a large-scale cyberattack, the risk is far from hypothetical. In 2015 and 2016 cyberattacks on substations in the Ukrainian electricity grid caused blackouts that left over 225,000 people without power. There is evidence of intrusions in the computer systems of energy companies in the European Union and the United States. In addition, during the Covid-19 pandemic several other critical infrastructure systems fell victim to cyberattacks.

Cyberattacks are a relatively new threat to the electricity system. As a result, the policy and regulatory landscape of cybersecurity for the electricity system is new and developing quickly.

Information

Type
Chapter
Information
Publisher: Intersentia
Print publication year: 2025

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Accessibility standard: Unknown

Accessibility compliance for the PDF of this book is currently unknown and may be updated in the future.

Save book to Kindle

To save this book to your Kindle, first ensure no-reply@cambridge-org.demo.remotlog.com is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×