Skip to main content

Currently Skimming:

4 Vulnerabilities of Systems for Sensing, Communication, and Control
Pages 38-47

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 38...
... the perceived threats to utility control centers. The most Most early communication and control systems used in likely threats identified were bypassing controls, integrity the operation of the electric power system were carefully violations, and authorization violations, with 40 percent of isolated from the outside world, and were separate from other respondents rating the seriousness of each as either a 5 or a 4 systems such as corporate enterprise computing.
From page 39...
... faster sampling rates. FIGURE 4.1 Perceived threats to power system control centers as reported in a survey of electric utilities conducted by EPRI in 2000.
From page 40...
... Programmable logic controllers, operate protective at this level.relays, systems to control transformer tap settings and capacitor banks, automated metering systems, and distributed control systems as well as a variety of field devices all operate at this level. NOTE: Numbers refer to points of vulnerability discussed in the text.
From page 41...
... The data can then be automatically downloaded to a PC or other risk of a "Trojan horse" or other deleterious program being device and transmitted to a central collection point. With this intentionally embedded in the software of one or more of technology, real-time communication links exist outside the the control centers is real, and this can only be addressed by utility infrastructure.
From page 42...
... However, today such relays can no longer be reached efforts to improve the security of control systems within the from the outside on most major systems, and new mandatory private sector by working through (1) the Electricity Sector security regulations are rapidly resulting in corrective action Coordinating Council (coordinated by the North American Electric Reliability Council)
From page 43...
... As of Bed (NSTB) program highlights potential risks that can March 2006, the top vulnerabilities of control systems and apply to some electricity sector organizations, describes potential mitigation strategies were assessed to be:
From page 44...
... often need data network that must be protected from external connections. from neighboring control centers or from market This is true whether a private network or the Internet is used computers.
From page 45...
... . Excerpts regarding 3 of the 10 listed vulnerabilities are given below: · Inadequately secured wireless communication (including microwave technologies)
From page 46...
... 2006. "The North American Power Delivery NERC (North American Electric Reliability Council)
From page 47...
... SAND2005 ated Mitigations -- 2006." North American Electric Reliability Council, 1002. Available at http://www.sandia.gov/scada/documents/ Control Systems Security Working Group, U.S.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.