Ukrainian Power Grid Attack Case Study

Decent Essays
Michael
Thank You for responding to my discussion board post. The Ukrainian power grid attack is an excellent example of both the ability of foreign governments to take down critical infrastructure to make political statements. In response to your questions if a person came across a PLC on a network it would be helpful if they had some knowledge PLC if they plan on taking it offline; however, it is possible that they could cause some damage just by poking and prodding the devices. Poking and prodding of the different components may not cause a safety override immediately, but once strange activity is noticed it would definitely be investigated and resolved. For example if a person connected to a power company’s SCADA network and started doing

Related Documents

  • Improved Essays

    Lee’s first targets were the Union positions at Cheat Mountain and Elkwater, guarding the Staunton Turnpike, one of the best roads through the mountains between the Shenandoah Valley and West Virginia. He had 9,000 men with which to carry out this operation, but they were not in the best of condition. The weather was also bad. The situation was made worse by Lee’s over adventurous plan. He split his force into five battalions , and sent them by different routes towards the two main Union spots .…

    • 186 Words
    • 1 Pages
    Improved Essays
  • Superior Essays

    Cybersecurity is vital to improving the security and reliability of the Western Interconnection power grid. As one of the most complex and critical infrastructures, the importance of prioritizing the continued security of the power grid should be at the top of the list. There are many different options that can improve security levels of both a physical and logical nature, such as disk drive encryption, digital certificates, Transport Layer Security (TLS), and Virtual Private Networks. Recommendation: Implement Full Disk Encryption Full disk encryption is the ability to convert data into unreadable code that can only be deciphered by authorized people. The encryption can include almost everything on the system such as temporary files and swap files.…

    • 2047 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    Both firewalls and intrusion detection systems are used to monitor network traffic and implement network security policies. Research these technologies and determine how they are similar and how they differ. Are both needed? Explain your answer in a short paper.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Rfp Task 5

    • 1162 Words
    • 5 Pages

    Project Details This scope of work document is targeted to allow the Supplier to provide a quote for a five year services proposal that is focused in the area of support for NERC CIP. The services described below will be quoted for the application to the cyber devices that exist in NextEra Power Plants that are subject to the NERC CIP Version 6 regulations. The Supplier will provide their rates for the execution of the services work described below and will provide a range of qualification levels that would be needed to execute each of the tasks described below as part of the Supplier response to the NextEra RFP. (11 Tasks) TASK 1: PROJECT MANAGEMENT SUPPORT AND ADMINISTRATION…

    • 1162 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    For instance loss of time in a business can cause major issues like money loss and also the frustration for customers and staff. The problems that can cause the loss of time can be like power cuts, floods, fires or a user infecting the network by putting in a USB which can be potentially infected from their home computers. To stop this happening in a short time you should have some emergency generators, data backups this is a good plan when the system is offline. Business information loss: If a business has an unsecured network, other big companies can use that time to see any of the records for that business. There are some programs online which allow you to access any important information such as account names, usernames, password and many more on an unsecured wireless network.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Estes Attack Case Study

    • 685 Words
    • 3 Pages

    I do not think that Estes should be held responsible for the attacks against the gay men in Madison, Wisconsin unless it is proven that there is a direct connection between the act of the attackers and Estes’ sign. By this I mean actual proof that the attackers acted out against the gay men because of this particular sign. After carefully reading this case a countless number of times, I drew up my own questions about the case because there are pieces of information missing from the case that are critical when trying to charge somebody with a crime. First question: how are we to know that the attackers actually saw Estes’ sign or that the attackers did not just act out on their own deeply-held beliefs? Also, it does not say that the attack was…

    • 685 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Emp Attack Research Paper

    • 973 Words
    • 4 Pages

    Do you think you could live in a world without your phone or computer? What about a world without electrical power at all? Well if an Electromagnetic Pulse, also known as an EMP were to occur, it would change the technology world forever. Such threats are often dismissed as unlikely or a relic from the Cold War. They are not.…

    • 973 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Art Attack Case Study

    • 215 Words
    • 1 Pages

    Art Attack will make their profit off of people attended the classes and just coming in to create art. Sales from this business are estimated at 120,000 the first year, and then will increase as the years go on. The location of the business has been decided to be on Main Street in Clarion Pennsylvania. Since there is not much competition around, there was not really a restriction on where the business would be located. One thing we took into consideration was that it was in walking distance for college students.…

    • 215 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Intergroup Attack Theory

    • 813 Words
    • 4 Pages

    In the New York Times article “A Social Reflex: Police and Blacks, Seeing Threat, Close Ranks” Amanda Taub discusses the “intergroup threat theory” as well as how conflicts effects group dynamics such as group cohesion and what she describes as “out-group hate” (Taub, Amanda.) Going in sync with the article, Taub talks about how threats, whether its focused on single members or the entire group as a whole, changes the behaviors of the people who identify with said group. These conflicts can range from actual violence directed towards the group to just changes to the infrastructure on the group. These threats however, can also rise “out group hate” or a prejudice towards other groups. In the article Taub uses the example of police shootings…

    • 813 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    It is highly important that we protect critical infrastructures, because they provides us all with essential services and are all vital to the United States. Critical infrastructures are vital to our security, economy, and survival of the nation. The National Response Team, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, the Transportation Security Administration, FEMA, Federal Air Marshal Service, and all levels of the government should be involved in planning the response to the bombing. It is necessary to have all these agencies together in order to better respond to attacks and protect our critical infrastructures.…

    • 224 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    As a product of today’s game consoles becoming more and more advanced, it is becoming easier for attackers to gain access to them. The purpose of this paper is to gain a better understanding of how these attacks occur and what can be done to protect oneself in situations such as this. I will attempt to examine multiple resources that can better explain things further. Game console attacks are rapidly increasing, consumers purchase roughly over one hundred million consoles each year which all connect to the internet to play and interact with countless servers and other users around the world.…

    • 440 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Using the Defense Security Service Insider Threat Risk Equation Where, Risk = (threat, vulnerabilities, values, or consequence), I propose the Risk of Russian insider threats has grown substantially, that US citizens, many with DoD security clearance access, maintain radicalized or adverse political beliefs favorable to Russia. Our vulnerabilities range from poor personnel vetting to all aspects of information and systems security, and DoD facilities security. Lastly, the values of these insider threats, threaten damage to the U.S. interests through possible espionage, terrorism, mission failure and a degradation of DoD resources and capabilities or other adverse consequences.…

    • 922 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    It is a cold December evening and the Clarke family just arrived home from a lovely evening dinner at Golden Corral. After taking Oscar for a walk and laying the kids down for the evening, the weather app on Mr. Clarke’s phone pops up with a freeze warning for the rest of the weekend. “Honey, it is going to be a cold one Friday and Saturday night! Don’t forget to turn the thermostat up a few degrees!” After they place their heads on the pillow and turn out the lights, their food coma takes over and sends them into a deep, dark sleep.…

    • 847 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Secondly, all the powers have very clear problems. One big problem with soft power is that it is difficult to incorporate into government strategy due to its dependency on credibility, and also results often take a long time and the resources used in soft power are not under full government control (83). An example of why soft power may not be successful if implemented in government strategy is with the issue of North Korea’s nuclear weapons because North Korea cannot be stopped with soft power (84). Any country would need hard power if they were to dispute this issue, not soft power because the use of culture or values would not be able to deter the use of weaponry. Soft power in government is also a problem because governments rarely have…

    • 1535 Words
    • 7 Pages
    Superior Essays