Security Countermeasures

1615 Words 7 Pages
Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather. Often, these outages last only a few hours or in extreme cases a couple days. Nevertheless, normal functions come to an abrupt halt. Consequently, these types of outages result from physical damage in the wake of high winds or precipitation and therefore planning …show more content…
Subsequently, attacks against switches, routers, and networks may have serious consequences on the efficiency in addition to control functions of the power system. These attacks can take the form of network interference through the injection of ad-hoc crafted streams of packets designed to flood the network. Another form is single implementation vulnerability in which the goal is to exploit an irregularity of a particular model of network devices caused by implementation errors. Fortunately, the known threats or possible threats are considered in creating countermeasures (López, Setola, & Wolthusen, 2012, p. 224-226).
Countermeasures are unequivocally essential to maintain control of the power systems. Several security protocol methods are required to combat the imminent threats that loom. Encryption mechanisms afford further security to communication channels making access difficult. Limited access within the infrastructure staff will reduce system compromise liability besides forcing password renewal on rotating frequencies. Technological advances in the biometrics field incorporated into the security access protocol will undoubtedly offer robust system
…show more content…
Internet and wireless devices are necessary to maintain along with monitoring power plants. While the benefits from networks are not in question, the security liability certainly is. As our society becomes increasingly dependent upon networks the loss of that capability will be profound. Moreover, taking into consideration the interlinked communication of all these automated systems unveils the reality of an attack on one system having a cascading and cataclysmic effect.
Conversely, the answer to the emerging liabilities appears to reside in the application of cutting edge technology. Even with cutting edge technology the level of security within a network degrades as the technology becomes common use. Thus, complacency is not acceptable in maintaining network security methods. Security of a network is comparable to a living organism that will continually grow and change. As a result, I believe technological advances will be forced into overdrive to address security

Related Documents