Email Document Reference

Enter your email address below and the reference for this document will be sent to shortly from webmaster@ceesi.com.

Title: Cyber Security
Author: David Blanco
Source: 2016 International School of Hydrocarbon Measurement
Year Published: 2016
Abstract: As a practical matter, the pressure to monitor and control large numbers of mission critical sites, the wide geographic distribution of these sites, and the environmental exposure of SCADA devices located at the sites, has driven the industry to low cost device solutions. The technological advances and evolving safety needs rapidly transformed Industrial Control Systems (ICS) from chart recorders to satellites and servers. Sites that werent even on a map were suddenly mapped on a communication network. While these innovations gave controllers more possibilities for production, they also gave hackers more opportunities for destruction. Once only able to delete and steal information, hackers now have the ability to control and destroy industrial equipment remotely and anonymously. This opportunity is so appealing that countries such as Russia, China, and Iran have created military departments dedicated to exploiting this phenomenon for political and economic leverage. The year 2014 saw 675,186 targeted attacks on Supervisory Control and Data Acquisition (SCADA) systems-more than quadruple from the previous year, which was itself doubled from the year before. 1: This issue is so pressing that the United States Government (USG) has become involved. Executive Order 13636 outlines the proactive and reactive steps that the USG will take in order to help industry prevent and mitigate cyber-security threats. 2: This document was quickly followed by action when the Department of Homeland Security (DHS) created several units to implement these policies such as the Industrial Control Systems Cyber Emergency Response Team (ICS - CERT) and the National Cyber-security and Communications Integration Center (NCCIC). 3: What the USG has not done, yet, is mandate security regulations.




In order to prevent spam and automated file downloads for documents within the Measurement Library, please follow the instructions below and then you will be able to email a reference to this article.





Copyright © 2024