Security Countermeasures

Amazing Essays
Modern power systems are made up of several interacting national systems. These systems interact providing essential support and monitoring in various power grids or sectors. While the advantages of systems interacting are bountiful in information gathering and sharing, it is not without certain drawbacks. Our society is dependent upon the availability of power and is quickly incapacitated by its loss. Simply observe the moderate disruption that is caused during severe weather. Often, these outages last only a few hours or in extreme cases a couple days. Nevertheless, normal functions come to an abrupt halt. Consequently, these types of outages result from physical damage in the wake of high winds or precipitation and therefore planning …show more content…
Subsequently, attacks against switches, routers, and networks may have serious consequences on the efficiency in addition to control functions of the power system. These attacks can take the form of network interference through the injection of ad-hoc crafted streams of packets designed to flood the network. Another form is single implementation vulnerability in which the goal is to exploit an irregularity of a particular model of network devices caused by implementation errors. Fortunately, the known threats or possible threats are considered in creating countermeasures (López, Setola, & Wolthusen, 2012, p. 224-226).
Countermeasures are unequivocally essential to maintain control of the power systems. Several security protocol methods are required to combat the imminent threats that loom. Encryption mechanisms afford further security to communication channels making access difficult. Limited access within the infrastructure staff will reduce system compromise liability besides forcing password renewal on rotating frequencies. Technological advances in the biometrics field incorporated into the security access protocol will undoubtedly offer robust system
…show more content…
Internet and wireless devices are necessary to maintain along with monitoring power plants. While the benefits from networks are not in question, the security liability certainly is. As our society becomes increasingly dependent upon networks the loss of that capability will be profound. Moreover, taking into consideration the interlinked communication of all these automated systems unveils the reality of an attack on one system having a cascading and cataclysmic effect.
Conversely, the answer to the emerging liabilities appears to reside in the application of cutting edge technology. Even with cutting edge technology the level of security within a network degrades as the technology becomes common use. Thus, complacency is not acceptable in maintaining network security methods. Security of a network is comparable to a living organism that will continually grow and change. As a result, I believe technological advances will be forced into overdrive to address security

Related Documents

  • Decent Essays

    Application Security – why it’s important? Application security is the utilization of programming, equipment, and procedural strategies to shield applications from outside dangers. Once a bit of hindsight in programming plan, security is turning into an inexorable imperative worry amid advancement as applications turn out to be all the more much of the time available over systems and are, subsequently, defenseless against a wide assortment of the dangers. Efforts to establish safety incorporated with application and a sound application security routine minimize the probability that unapproved code will have the capacity to control applications to get to, take, change, or erase touchy information. Moves made to guarantee application security…

    • 1555 Words
    • 6 Pages
    Decent Essays
  • Decent Essays

    A Vulnerability Assessment needs to be completed to identify weaknesses in the network security configuration in order to suggest changes. We must keep in mind that documentation on how the network systems are configured is critical for the recovery process during a penetrating testing. Vulnerability Assessments are designed to identify network weaknesses and help coming with security improvements and remedies. Penetration testing is a testing method that tries to exploit a weakness in the system to prove that an attacker could successfully penetrate it. (Kim, D. & Solomon, Michael 2014, page 486).…

    • 706 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Also, aggregation of data in cloud to reduce system admin or other infrastructure may poses additional security challenges. Expectations to have better cyberspace which is secure, resilient and enables innovation ensuring public health and safety. Conclusion In the end, Fast evolving technology keeps challenging to cybersecurity solutions , while vulnerabilities are vast and laws created for them is unclear. According to center for law and security single actor can’t make any changes without collaborative effort. Cooperation among government and private sector to balance the effectiveness with efficiency and security with privacy and innovation in a practical…

    • 1171 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Despite all of their potential benefits, IT outsourcing entails risks that could lead to undesirable results opposite of the expected advantages (Bouchaib Bahli, Suzanne Rivard). capabilities in the long run since there is too much dependency on external sourcing. The major risks related to IT outsourcing are described below: 1. Security and Confidentiality risks: The vendor can access all the confidential information and any other privacy resources that the organization usually regards as classified and personnel. This is a huge risk issue since it touches the security and the staff rights of the company.…

    • 1224 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    It should be able to provide network audit all the time (e.g. which devices are up or down, network state etc). It can be a challenging task. For example, Overflow supports a fail-secure mode for switches, if they are disconnected from the controller they can choose to operate on their internal logic that might not be desired behavior. Therefore, it is important to understand the forwarding behavior of the switch during interruptions because in order to provide auditing and accountability such information should be managed by the…

    • 710 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Human Dimensional Impacts upon Information Security Infrastructure William Fisher University of Maryland University College CSEC610 Cyberspace and Cybersecurity Professor Hall Abstract Evaluating the vulnerabilities of an organization’s information security starts with the risk assessment. The process includes the method performed and current protocols to both measure the risk involved and address attacks. Typically, businesses will have a network tailored to their particular needs balancing cost and need. All the technological tools commercially available can build a commanding network that contains the latest hardware and the most sophisticated software; however, those systems have but one unpredictable fault, the human factor. This paper…

    • 2361 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    To protect my company assets from cyber threats/attacks many things must be taken into consideration because there is always a deeper internal issue in what we believe is secure. Risk assessment and risk management are both very important parts of planning to create a safe, secure work environment to protect my employees and company both on the inside and outside of the company. I would assure that my company conducts a risk assessment periodically. This helps to see what has failed in the past versus what improvements and corrective actions have been made to present day. Comparing and contrasting the effects of failures also helps to determine if the current improvement fall into the same category.…

    • 700 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    There are many different ways you can identify your risks. You can start by brainstorming with personnel and work on identifying which of your assets are at risk. Take for example the difference of a server to a workstation is terms of security. A server is more likely to contain more sensitive information on it than your typical workstation, so even though the workstations need to be secured, a stolen or compromised server would cause more damage and therefore needs to be placed hire on the risk chart. After you have identified your risks, you can then begin to develop a policy that will help to reduce or eliminate the risks.…

    • 1045 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Data security in the healthcare sector must be persistent and sufficient in ensuring the privacy and protection of patient’s information. The developing threat postured by malicious coding, such as viruses and worms, and unethical hackers can by reduced by the utilization of government standardize security controls. For instance, the Health Insurance Portability and Accountability Act has established security necessities regulations to ensure the protection of health information. However, organization must address the potential risk existing an internal and external networks to tackle threats effectively. Developing an effective network infrastructure by using resource hardware components as switches and routers to boost network security can reduces business operations interruption from attacks.…

    • 782 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    The plans should be detailed enough to provide a comprehensive defense against an attack. Incident managers should be well versed with the emergency protocols such as coordination, information sharing and backup procedures that are necessary under such circumstances. These principles provide security strategists the necessary guidelines to implement an effective security apparatus. With data security becoming one of the top concerns for organizations that handle sensitive customer information, it is important that security analysts look at the holistic picture of the security landscape rather than having a narrow scoped approach to protect and improvise their security…

    • 810 Words
    • 4 Pages
    Decent Essays