Vectors of ensuring economic security of energy enterprises in the context of quantum transformation

Authors

  • Alla Tkachenko National University “Zaporizhzhia Polytechnic” https://orcid.org/0000-0003-1061-4594
  • Serhii Levchenko Department of Internal Affairs and Communications of the Zaporizhzhya Region

DOI:

https://doi.org/10.26906/EiR.2025.1(96).3771

Keywords:

economic security of an enterprise, economic losses, severe economic consequences, ‘lines of defence’ of electric power enterprises, cyber defence, cyber hygiene

Abstract

The article emphasises that the key to Ukraine's energy security during the war and post-war years is decentralisation and distributed generation, which inherently involve creating an extensive energy production and transmission system based on multiple sources located near consumers. It is emphasised that distributed power generation has a number of advantages but requires the use of digital technologies, which, with the evolution of digitalisation, are increasingly accompanied by cyber-attacks and cyber incidents. As practice shows, their manifestations seriously affect energy companies' economic security. It is emphasised that with quantum transformation, cyber threats are further exacerbated since quantum computers are quite powerful and instantly destroy the cyphers for access to information and the power system, thus causing large-scale losses to energy enterprises. Repeatability, which requires additional time. It is substantiated that energy companies should already consider a migration plan and take a crypto-agility position that will allow them to quickly update in the event of cyber-attacks. The author considers the chronology of quantum threats and factors that complicate the cybersecurity of energy enterprises. The author points out the abilities of quantum computers compared to classical ones. Examples of technologies designed to mitigate quantum threats to critical infrastructure are given. It is substantiated that measures to prevent quantum threats and minimise the consequences of cyber-attacks and cyber incidents should be taken both at the level of the State and the energy sector, and at the level of territorial communities and energy enterprises. An algorithm for the sequence of actions to create a ‘line of defence’ of electric power enterprises against cyber-attacks and cyber incidents in the context of quantum transformation is proposed. It is substantiated that the introduction of a ‘line of defence’ of electric power enterprises against cyber-attacks and cyber incidents in the context of quantum transformation according to the proposed algorithm will prevent their impact or minimise their consequences and thus guarantee the preservation of economic security of enterprises in the context of growing external threats.

Author Biographies

Alla Tkachenko, National University “Zaporizhzhia Polytechnic”

Doctor of Economics, Professor

Serhii Levchenko, Department of Internal Affairs and Communications of the Zaporizhzhya Region

Chief State Inspector of the Information Systems Support Department of the Department of Information Technologies

References

1. Chaplynska, N., & Makeienko, P. (2023) Innovative solutions for ensuring energy security of Ukraine and the world [Innovative solutions for ensuring energy security of Ukraine and the world]. Akademichnyi ohliad - Academic review, vol. 2 (59), pp. 284-297.

2. Tkach, D. K., & Vasylieva, O. V. (2025) Enerhetychnyi sektor Ukrainy u voiennyi ta pisliavoiennyi period: stratehichni pidkhody ta innovatsiini rishennia. [Ukraine's energy sector in the war and post-war period: strategic approaches and innovative solutions]. European Scientific Journal of Economic and Financial Innovation, vol. 1(15), pp. 300-308. DOI: http://doi.org/10.32750/2025-0126

3. Vorobel, R. V. (2024) Vidnovliuvalna enerhetyka v Ukraini: suchasnyi stan, problemy ta perspektyvy rozvytku [Renewable energy in Ukraine: current state, problems and development prospects]. Mizhnarodnyi naukovyi zhurnal «Internauka» - International scientific journal "Internauka", vol. 1(81). DOI: https://doi.org/10.25313/2520-2294-2024-1

4. Zhuravel, Ya. V., Lytvyn, N. A., & Yara, O. S. (2023) Rozvytok zakonodavstva pro stymuliuvannia vykorystannia alternatyvnykh dzherel enerhii: administratyvno-pravovyi aspect [Development of Legislation on Stimulating the Use of Alternative Energy Sources: Administrative and Legal Aspect]. Pravo i suspilstvo - Law and Society, vol. 1, pp. 166-173. DOI: https://doi.org/10.32842/2078-3736/2023.2.1.26

5. Havrylenko, Ya., & Derii, V. (2024) Formuvannia pravovykh zasad funktsionuvannia ta rozvytku «zelenoi» enerhetyky [Formation of the legal framework for the functioning and development of ‘green’ energy]. Systemni doslidzhennia v enerhetytsi, vol. 4(80), pp. 120-133. DOI: https://doi.org/10.15407/srenergy2024.04.120

6. Kioskli, K., Fotis, T., Nifakos, S., & Mouratidis, H. (2023) The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0 . MDPI, no. 13(6). DOI: https://doi.org/10.3390/app13063410

7. Fikry, A., Hamzah, M., Hussein, Z., Abdul, A., & Bakar, K. (2024) Defining the Beauty of Cyber Hygiene: A Retrospective Look. IEEE Engineering Management Review, vol. 52, no. 2, pp. 174-180. DOI: https://doi.org/10.1109/EMR.2024.3361023

8. Cain, A. A., Edwards, M. E., & Still, J. D. (2018) An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, vol. 42, pp. 36–45. DOI: https://doi.org/10.1016/j.jisa

9. Sarker, I. H., Janicke, H., Mohsin, A., Gill, A., & Maglaras, L. (2024) Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express, vol. 10, is. 4, pp. 935-958. https://doi.org/10.1016/j.icte.2024.05.007.

10. Ncubukezi, T., Mwansa, L., & Rocaries, F. (2020) A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses.Technology and Secured Transactions – 2020: 15th International Conference for Internet. London. DOI: https://doi.org/10.23919/ICITST51030.2020.9351339

11. Jurgens, J., Kohn, S., & Souta, C. (2022) Transitioning to a Quantum-Secure Economy. World Economic Forum. Available at: https://www3.weforum.org/docs/WEF_Transitioning%20to_a_Quantum_Secure_Economy_2022.pdf (accessed March 1, 2025).

12. Verkhovna Rada of Ukraine. (2021, September 21). On critical infrastructure: The Law of Ukraine No. 1882-IX. Available at: https://zakon.rada.gov.ua/laws/show/1882-20#Text (accessed March 3, 2025).

13. Ministry of Energy of Ukraine. (2022, December 15). Cybersecurity requirements for the fuel and energy sector of critical infrastructure: Order No. 417. Available at: https://zakon.rada.gov.ua/laws/show/z0249-23#n14 (accessed March 4, 2025).

14. Shkuratov, O., Antonova, L., & Dziuba, R. (2024) Innovatsiini mekhanizmy ta realizatsiia derzhavnoi ekonomichnoi polityky pisliavoiennoho vidnovlennia Ukrainy: kvantovi transformatsii yak draiver rozvytku [I Innovative mechanisms and implementation of the state economic policy of post-war recovery of Ukraine: quantum transformations as a driver of development]. Public Administration and Regional Development, vol. 26, рр. 1254-1272. DOI: https://doi.org/10.34132/pard2024.26.08

15. Jurgens, J., & Cin, P. (2025) Global Cybersecurity Outlook 2025. Insight report World Economic Forum's. Available at: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ (accessed March 1, 2025).

1. Chaplynska N., Makeienko P. Innovative solutions for ensuring energy security of Ukraine and the world. Академічний огляд. 2023. № 2(59). С. 284-297. DOI: https://doi.org/10.32342/2074-5354-2023-2-59-19

2. Ткач Д.К., Васильєва О.В. Енергетичний сектор України у воєнний та післявоєнний період: стратегічні підходи та інноваційні рішення. European scientific journal of Economic and Financial innovation. 2025. № 1(15). С. 300-308. DOI: http://doi.org/10.32750/2025-0126

3. Воробель Р.В. Відновлювальна енергетика в Україні: сучасний стан, проблеми та перспективи розвитку. Міжнародний науковий журнал «Інтернаука». 2024. № 1(81). DOI: https://doi.org/10.25313/2520-2294-2024-1 DOI: https://doi.org/10.25313/2520-2294-2024-1

4. Журавель Я.В., Литвин Н.А., Яра О.С. Розвиток законодавства про стимулювання використання альтернативних джерел енергії: адміністративно-правовий аспект. Право і суспільство. 2023. Т. 1. С. 166-173. DOI: https://doi.org/10.32842/2078-3736/2023.2.1.26 DOI: https://doi.org/10.32842/2078-3736/2023.2.1.26

5. Гавриленко Я., Дерій В. Формування правових засад функціонування та розвитку «зеленої» енергетики. Системні дослідження в енергетиці. 2024. № 4(80). С. 120-133. DOI: https://doi.org/10.15407/srenergy2024.04.120 DOI: https://doi.org/10.15407/srenergy2024.04.120

6. Kioskli, K., Fotis, T., Nifakos, S., Mouratidis, H. The Importance of Conceptualising the Human-Centric Approach in Maintaining and Promoting Cybersecurity-Hygiene in Healthcare 4.0. MDPI. 2023. No. 13(6). DOI: https://doi.org/10.3390/app13063410 DOI: https://doi.org/10.3390/app13063410

7. Fikry A., Hamzah M., Hussein Z., Abdul A. and Bakar K. Defining the Beauty of Cyber Hygiene: A Retrospective Look. IEEE Engineering Management Review. 2024. Vol. 52, No. 2, Pp. 174-180. DOI: https://doi.org/10.1109/EMR.2024.3361023 DOI: https://doi.org/10.1109/EMR.2024.3361023

8. Cain, A.A., Edwards, M.E., & Still, J.D. An exploratory study of cyber hygiene behaviors and knowledge. Journal of Information Security and Applications, 2018, Vol. 42, Pp. 36–45. DOI: https://doi.org/10.1016/j.jisa DOI: https://doi.org/10.1016/j.jisa.2018.08.002

9. Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Asif Gill, Leandros Maglaras. Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects. ICT Express. 2024. Vol. 10. Pp. 935-958. DOI: https://doi.org/10.1016/j.icte.2024.05.007. DOI: https://doi.org/10.1016/j.icte.2024.05.007

10. Ncubukezi T., Mwansa L. and Rosaries F. A Review of the Current Cyber Hygiene in Small and Medium-sized Businesses. 15th International Conference for Internet Technology and Secured Transactions (ICITST), London, United Kingdom, 2020. Pp. 1-6. DOI: https://doi.org/10.23919/ICITST51030.2020.9351339 DOI: https://doi.org/10.23919/ICITST51030.2020.9351339

11. Jurgens J., Kohn S., Souta C. Transitioning to a Quantum-Secure Economy. World Economic Forum. 2022. URL: https://www3.weforum.org/docs/WEF_Transitioning%20to_a_Quantum_Secure_Economy_2022.pdf (дата звернення: 01.03.2025).

12. Про критичну інфраструктуру. Закон України від 21.09.2021 р. №1 882 – ІХ. URL: https://zakon.rada.gov.ua/laws/show/1882-20#Text (дата звернення: 03.03.2025).

13. Вимоги з кібербезпеки паливно-енергетичного сектору критичної інфраструктури. Наказ Міністерства енергетики України від 15 грудня 2022 р. № 417. URL: https://zakon.rada.gov.ua/laws/show/z0249-23#n14 (дата звернення: 04.03.2025).

14. Шкуратов О., Антонова Л., Дзюба Р. Інноваційні механізми та реалізація державної економічної політики післявоєнного відновлення України: квантові трансформації як драйвер розвитку. Public Administration and Regional Development. 2024. № 26. С. 1254-1272. DOI: https://doi.org/10.34132/pard2024.26.08 DOI: https://doi.org/10.34132/pard2024.26.08

15. Jurgens J., Cin P. Global Cybersecurity Outlook 2025. Insight report World Economic Forum's. 2025. URL: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ (дата звернення: 01.03.2025).

Downloads

Published

2025-03-28

How to Cite

Tkachenko, A., & Levchenko, S. (2025). Vectors of ensuring economic security of energy enterprises in the context of quantum transformation. Economics and Region, (1(96), 248–254. https://doi.org/10.26906/EiR.2025.1(96).3771

Issue

Section

ECONOMIC SECURITY OF UKRAINE