Cyber Attack on Electric Grids Can be Devastating:National Research CouncilAdded 30th Nov 2012
The U.S. is in urgent need of a nationwide strategy to protect its highly vulnerable electric grid from succumbing to a cyberattack that could cause far more damage than Hurricane Sandy, a recent report said.
Terrorists who gained access to any one of a number of key facilities, either through Internet-delivered malware designed to destroy control systems or through a saboteur on the inside, could black out large regions of the nation for weeks or months, the report from the National Research Council said.
Damage from such an attack would be many billions of dollars more than the destruction caused by Sandy last month on the East Coast.
"Considering that a systematically designed and executed terrorist attack could cause disruptions even more widespread and of longer duration, it is no stretch of the imagination to think that such attacks could produce damage costing hundreds of billions of dollars," M. Granger Morgan, head of the engineering and public policy department at Carnegie Mellon University, said in a statement. Morgan was chairman of the committee that wrote the report released this month.
The grid's acute vulnerability comes from being spread across hundreds of miles and having many unguarded key facilities. In addition, federal legislation in the mid-1990s that opened the door to more competitors in the power market has stressed the nation's bulk high-voltage system, leaving it at risk to multiple failures following an attack.Ã'Â
The grid is also riddled with important pieces of equipment that are decades old and lacks advanced technology for sensing and control that could limit outages. An example is how Long Island Power Authority struggled to restore electricity after Sandy, which caused more than $70 billion in damages. News media reported that the utility was hampered by the use of decades-old mainframe computers.
"As utilities struggle to make a profit, their last concern is updating antiquated systems and investing in security," said Darren Hayes, a professor at Pace University and an expert in computer forensics and security.Ã'Â
Another problem lies with utilities over the years joining their IT operations in order to cut costs, Hayes said.
"Security has not been a priority but should be now that many utilities have centralized their IT operations to reduce costs," Hayes said in an email. "This centralization has meant that utilities networked together can be brought down together in a catastrophic manner."Ã'Â
Fear of a cyberattack on the nation's critical infrastructure was heightened following the discovery of Stuxnet, sophisticated malware that damaged Iran's nuclear facilities in 2010. Iran has vowed to take "pre-emptive" strikes against the countries it believes are responsible. The New York Times reported that the U.S. and Israel developed Stuxnet together.
[See related: The changing security battlefield]
The report recommends ways to protect the nation's power delivery system, starting with money. Funding for research is currently much smaller than needed, the study said.
Besides money, the report recommends developing, manufacturing and stockpiling "universal recovery transformers" that could temporarily replace downed high-voltage transformers, which are often custom built outside the U.S. and can take months, or even years, to replace. Recovery transformers would be less efficient, but they could drastically reduce delays in restoring power. The U.S. Department of Homeland Security (DHS) has recently started working with the U.S. power industry on a program to develop and test recovery transformers.
Other points of weakness include communication, sensor and control systems that are open to cyberattacks through an Internet connection or by sabotage from within. The best solution is to remove connections with the Internet, the report said. In those cases where that isn't possible, then state-of-art technical and managerial security systems should be in place, including systems that monitor for operator error or sabotage.
The threat of attack from the inside was made clear in August when a virus named Shamoon erased the data on three quarters of the corporate PCs of state-owned oil company Saudi Aramco. An insider is believed to have infected the computers through a USB memory stick inserted into a PC.Ã'Â
Finally, the report recommends that DHS and the Energy Department initiate and fund assessment programs across cities, counties and states. These programs should act as models for local and regional planning efforts that have a goal of eliminating vulnerabilities.
More collaboration and sharing of information between government agencies and private industry are also needed. But for that to happen, the federal government will have to address public policy and legal barriers, the report said.
That last condition may be difficult given the opposition to proposed legislation to mandate information sharing. This month, the Cyber Security Act of 2012 failed to pass the Senate, largely due to opposition from businesses and privacy advocates.
President Obama, who supported the bill, is expected to issue an executive order implementing those elements that do not require congressional approval.
Read more about critical infrastructure in CSOonline's Critical Infrastructure section.
V.S. Shridhar, head – India Enterprise Business, Tata Communications, set the context at WeConnect 2013-2014 with his keynote on the rapid growth of the "prosumer" trend and how it had already begun impacting enterprise IT.
WeConnect 2013-2014 hosted panel discussions which looked into bridging the IT-business gap within the enterprise segment in a new light. The event provided a platform to premier IT leaders to gain insights and understand the challenges that plague their contemporaries .
China is working on a Linux operating system that can replace the now-vulnerable Windows XP and protect the country's networking infrastructure.
An IBM project to widen the use of its Power server chips inched forward Wednesday with Big Blue trying to challenge Intel for a bigger role in the hyperscale data centers run by the likes of Google and Facebook.
Chinese smartphone maker Xiaomi plans to enter ten foreign markets later this year, including Brazil, Mexico and Russia, in a bid to expand globally with its low-cost but cutting-edge phones.
A new report has revealed more than half of cybercriminal attack traffic in the first quarter of 2014 was aimed at the media and entertainment industry.
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday.
Enterprise workloads are shifting to cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report.
Nine basic attack patterns constituted 92 per cent of cybersecurity incidents over the last ten years according to the latest report from Verizon.
Cisco today announced Managed Threat Defense, a set of security services for the enterprise that Cisco is providing through two new operations centers to remotely support intrusion-detection, incident response and forensics, among other services.
Sometimes a security patch isn't all it's cracked up to be. The security researcher who first found a vulnerability affecting more than 20 different router models says the patch meant to fix it only hides the initial weakness and doesn't remove it whatsoever.
Salesforce.com recently celebrated its 15th year in existence, and as the SaaS (software-as-a-service) vendor races toward US$5 billion in revenue its influence on the industry is being felt more than ever. At the same time, some signs indicate that Salesforce.com is having a few growing pains, as well as showing some trappings of the mega-vendors it once mocked with its "End of Software" marketing campaign.
Can your tablet withstand a 2-meter drop or be submerged in water for 30 minutes and keep functioning? The new $5,000 tablets from Xplore Technologies can.
A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.
Mainframe operators using BMC software may now be able to enjoy the speedy, devops-style development pace that is quickly becoming the norm for customer-facing mobile applications and Internet services.