Blog Posts Tagged with "Smart Grid"
December 12, 2011 Added by:Headlines
“Many SCADA systems were deployed without security in the belief that SCADA would always be isolated from the Internet. But it’s not, and even when it is, attacks such as Stuxnet can circumvent the isolation by using USB memory sticks to spread..."
December 08, 2011 Added by:Headlines
"Interfacing so many different hardware and software components introduces vulnerabilities—especially when new and legacy hardware and software need to operate together... Perfect protection from cyber attacks is not possible. There will be a successful attack at some point..."
November 26, 2011 Added by:Rafal Los
Media reports would lead the outside observer to believe that nothing is being done to improve the state of cybersecurity for our critical infrastructure, and this is completely false. A significant amount of effort is being expended in both improving the security of existing systems...
November 16, 2011 Added by:Headlines
"Utility cyber security is in a state of near chaos. After years of vendors selling point solutions, utilities investing in compliance minimums rather than full security, and attackers having nearly free rein, the attackers clearly have the upper hand..."
November 08, 2011 Added by:Headlines
"As the rate of bolder, more sophisticated cyber attacks continues to spiral upward, ensuring data integrity and security has become increasingly challenging. By necessity, preventing unauthorized intrusion into critical systems has become a top priority..."
November 08, 2011 Added by:Headlines
"Making such dramatic changes to the power grid requires an overarching vision of how to accomplish the task, and this updated Framework advances that vision. Utilities, manufacturers, equipment testers and regulators will find essential information... that was not previously available..."
October 18, 2011 Added by:Headlines
“Unfortunately, one thing has not changed. Cyber security is still way behind the attackers. Even where strong countermeasures exist, they are not consistently deployed, and most sophisticated attackers look at smart grids from a systemic perspective..."
September 14, 2011 Added by:Headlines
"The potential benefits of Smart Grids are enormous, they can only be fully reached if we can all agree on global solutions. It is promising to see that NIST and SG-CG will be supporting common positions and areas of collaboration to ensure a consistent set of international standards..."
May 11, 2011 Added by:Robert Siciliano
Critical infrastructures all depend on the electric grid. After a major attack, we’d be back to the dark ages in an instant. No electricity, no computers, no gasoline, no refrigeration, no clean water. Think about what happens when the power goes out for a few hours. We’re stymied...
April 27, 2011 Added by:Mike Meikle
How will infosec be impacted by the push toward Smart Grid technologies? Information security skills encompassing everything from applications to hardware will be in great demand. The collected data needs to be securely protected when utilized by the consumer and provider...
March 31, 2011 Added by:David Navetta
The Act seeks to establish standards to govern the use and disclosure of utility data (including personal information) by electric utilities, and requires electric utility companies to maintain the confidentiality of customer data and allow customers to access the data...
March 22, 2011 Added by:Ben Rothke
With the benefits of AMI come security and privacy issues, and those open the metering infrastructure to thieves, stalkers, and a range of other threats. AMI also opens up a new set of privacy issues in that the AMI devices will be collecting significant amounts of personal energy data...
March 13, 2011 Added by:Ron Lepofsky
Electrical utilities are already challenged with the process of becoming certified for compliance with the NERC CIP standard for IT security. The NERC CIP standard is evolving, thank goodness. Perhaps you haven’t noticed the innocuous sounding proposed new standard now in the creation process...
February 21, 2011 Added by:Ron Lepofsky
NERC CIP standards are written expressly for electrical utilities. If rigorously deployed they are a material step towards security. A more comprehensive set of security control within COBIT, upon which IT SOX compliance is based, should be considered for hardening the electrical grid...
February 19, 2011 Added by:David Navetta
The core team has invited stakeholders from across the utility sector to participate in the initiative, including representatives from the Federal Energy Regulatory Commission, the Department of Homeland Security, and both publicly and privately-owned utilities...
November 30, 2010 Added by:Guy Huntington
Cars in the future will have their own “utility identity”. This will be done via the use of a digital certificate. When a electric car pulls up to a charging station, the utility will be able to query the car’s computer system and receive the digital certificate identifying the car and owner...
Debunking The Biggest Cyber Security Myths ... manthan rathod on 03-01-2015
Wireless Home Technologies Create Security R... abdul bari Chanessra on 03-01-2015
A Tenuous Grasp on Reality... Madge Marple on 03-01-2015