Security Countermeasures

Great Essays
Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather. Often, these outages last only a few hours or in extreme cases a couple days. Nevertheless, normal functions come to an abrupt halt. Consequently, these types of outages result from physical damage in the wake of high winds or precipitation and therefore planning …show more content…
Subsequently, attacks against switches, routers, and networks may have serious consequences on the efficiency in addition to control functions of the power system. These attacks can take the form of network interference through the injection of ad-hoc crafted streams of packets designed to flood the network. Another form is single implementation vulnerability in which the goal is to exploit an irregularity of a particular model of network devices caused by implementation errors. Fortunately, the known threats or possible threats are considered in creating countermeasures (López, Setola, & Wolthusen, 2012, p. 224-226).
Countermeasures are unequivocally essential to maintain control of the power systems. Several security protocol methods are required to combat the imminent threats that loom. Encryption mechanisms afford further security to communication channels making access difficult. Limited access within the infrastructure staff will reduce system compromise liability besides forcing password renewal on rotating frequencies. Technological advances in the biometrics field incorporated into the security access protocol will undoubtedly offer robust system
…show more content…
Internet and wireless devices are necessary to maintain along with monitoring power plants. While the benefits from networks are not in question, the security liability certainly is. As our society becomes increasingly dependent upon networks the loss of that capability will be profound. Moreover, taking into consideration the interlinked communication of all these automated systems unveils the reality of an attack on one system having a cascading and cataclysmic effect.
Conversely, the answer to the emerging liabilities appears to reside in the application of cutting edge technology. Even with cutting edge technology the level of security within a network degrades as the technology becomes common use. Thus, complacency is not acceptable in maintaining network security methods. Security of a network is comparable to a living organism that will continually grow and change. As a result, I believe technological advances will be forced into overdrive to address security

Related Documents

  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Abstract: With a specific end goal to outline and fabricate the secured network system, numerous elements must be thought seriously about, for example, the topology and position of hosts inside of the system, the determination of equipment and programming innovations, what's more, the cautious arrangement of every part. My paper will be an examination of the issues percentage in outlining a safe Local Area Network (LAN) and a best's portion practices proposed by security specialists. I will examine securing a LAN from network's perspective. [1] Introduction: With most complex innovations, there's not one size-fits-all arrangement regarding the matter of network administration. The needs and assets of every one of a kind association will relate…

    • 877 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    Project Details This scope of work document is targeted to allow the Supplier to provide a quote for a five year services proposal that is focused in the area of support for NERC CIP. The services described below will be quoted for the application to the cyber devices that exist in NextEra Power Plants that are subject to the NERC CIP Version 6 regulations. The Supplier will provide their rates for the execution of the services work described below and will provide a range of qualification levels that would be needed to execute each of the tasks described below as part of the Supplier response to the NextEra RFP. (11 Tasks) TASK 1: PROJECT MANAGEMENT SUPPORT AND ADMINISTRATION…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Emp Attack Research Paper

    • 973 Words
    • 4 Pages

    Do you think you could live in a world without your phone or computer? What about a world without electrical power at all? Well if an Electromagnetic Pulse, also known as an EMP were to occur, it would change the technology world forever. Such threats are often dismissed as unlikely or a relic from the Cold War. They are not.…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    The outages on 3/8 at 6:07AM and 6:27AM appeared to be due to transfer switch operation in order to test the emergency power system. There were no other outages, sags surges, or impulses outside of specification, which indicate that the power quality was OK during the monitoring period. If there are questions regarding the data in this report contact…

    • 60 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Consequently, my academic work was lost and I learned the hard way about the need for data sticks. Our neighborhoods in Halesite were unreachable for weeks due to felled trees and powerlines. Without electric power, it is impossible…

    • 382 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Individuals must become focused to the all hazards approach like emergency management to understand risk and mitigation. However, technology hazards are often not considered a threat because, it may be forgotten about or not believed to be a threat or risk. These hazards occur after the failure or damage to structures and systems in which humans rely on but, are much less understood than the natural hazards (Haddow et, al 2014). Electrical grids are controlled by computer programs, social media and other communications platforms essential for community notification are dependent upon technology. Hence, the importance of grasping the all hazards risk and threat assessment for preparedness and…

    • 784 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Traditionally, power grid architectures were standalone systems that consisted of proprietary protocols traversing legacy hardware and software systems (Li et al., 2012). Power grid automation systems using this type of architecture carried high operating costs that power companies found to be inefficient over time (Kuder et al., 2010). Due to this inefficiency, power companies began to integrate the operation of power grid automation systems into public networks. This integration served its purpose of reducing operating cost, but significantly increased the power grids exposure to cyber-attacks (Kuder et al., 2010). Recent discoveries that hackers have inserted software into the US electrical grid, allowing the grid to be disrupted at a later date from a remote location, clearly demonstrates the fact that the utility infrastructure is quite vulnerable and that its overall mission of serving the population could be severely compromised as a result of a cyber-attack (Li et al., 2012).…

    • 2030 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Power Outage Case Study

    • 1649 Words
    • 7 Pages

    In managing a network problems with the network are to be expected and planned for when and where possible. Many of these plans created to deal with problems cover what to do if a part of the system is attacked or compromised along with what to do in the event of a natural disaster. This does not mean everything is covered as some problems are deem unlikely or a minor enough event that it should not be a problem to deal with. One potential problem that can find itself label in such a way are power outages as this is a problem but not one likely to be viewed as overly serious as they do not happen often and when they do they tend to be brief. This issue along with what types of problems and solutions to each is what will be focused on for this…

    • 1649 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    There are a few final considerations to examine for the setup of the WAN and LAN networks that will be running through all Kudler locations. Here we will discuss the software and hardware needed for security and functionality of the network at each location. Firewalls Any connection to the internet has some risk of attack from external sources, which means our proposed setup introduces this risk at each Kudler location.…

    • 879 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    There are various networks for the means of communication and data transfer including 3G, 4G, LTE for mobile network, however optical network is required for the communication of large amount of data in short period of time. Many smarter devices are being added to network to fulfil consumer’s demand. There are many complications and strains have arisen to optical networking with the advancement of technology. some management and security techniques can be adopted to get the best out of network infrastructure. More security and control mechanisms are added into optical networks for the deployment of a reliable and secure management system using efficient control techniques, however many of available network control and management method are…

    • 843 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Physical security is often overlooked (and its importance underestimated) in favor of more technical and dramatic issues such as hacking, viruses, Trojans, and spyware. However, breaches of physical security can be carried out with little or no technical knowledge on the part of an attacker. Moreover, accidents and natural disasters are a part…

    • 848 Words
    • 4 Pages
    Improved Essays