preview

Supervisory Control and Data Acquisition System Attacks Essay

Decent Essays

Cyber threats to the energy infrastructure are pervasive. Reports have indicated numerous attempts to enter the nation’s information technology architectures are credible. Is has become common today that threats come from many origins. Some threats are traced from intentional or accidental incidents. Likewise, some threats toward the energy infrastructures come from a disgruntled employee or points of origin traced from foreign nations, seeking opportunities to exploit or cripple the nation’s infrastructures. Additionally, there are threats that attempt to manipulate the power grid profit margins, particularity the electricity sector through deceitful practices by employees. “By changing the reading during this period, they were able …show more content…

For an example, back in 2006, Nuclear Plant employees urgently discontinued operations of the Tennessee Valley Authority (TVA) nuclear facility upon discovery of malfunctioning coolant reactor pumps. “TVA determined the root cause of the event was the malfunction of the VFD controllers because of excessive traffic on the plant integrated computer systems network—a broadcast storm” (Weiss, 2010).

By way of contrast, the energy industry endures vulnerabilities from other unintentional sources. A prime example is electromagnetic communication interference (EMI). This vulnerability affects radio communications modules tied to SCADA systems. Additional vulnerabilities that prevail in the energy infrastructures is the lack of acknowledgment when it comes to protocols, rules, and regulations. Anotherwords, if information technology standards within the energy industry are too advanced to comprehend, system administrators may repudiate their importance. On the other hand, if policies and information assurance practices are published through electronic means through either the internet or intranet, a security vulnerability exists. “Some respondents even warn about the danger of providing too much useful information for potential attackers” (Laing, Badii, & Vickers, 2013, p. 107). Consequently, attackers could potentially extract technical knowledge databases through hacking efforts and skill set to gain an understanding of all system applications in an

Get Access