Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-sjtt6 Total loading time: 0 Render date: 2024-07-01T07:42:48.052Z Has data issue: false hasContentIssue false

9 - The collision of two critical infrastructures

from Part III - Critical decisions

Published online by Cambridge University Press:  05 June 2015

Jimmy Y. Jia
Affiliation:
Pinchot University, Seattle
Get access

Summary

Resilience of the electric sector to cyber attacks should be no less resilient than to a tornado.

Cybersecurity for State Regulators (Keogh and Cody, 2012)

In November 2013, a cybersecurity breach at Target Corporation resulted in the theft of as many as 110 million customers' data, cost the company hundreds of millions of dollars, and triggered the first termination of a publicly traded company's CEO in response to a cyber event (Harris et al., 2014). The attack was one more indicator of a growing trend of cyberinsecurity now challenging every public and private organization. The problem has been noticeably accelerating since the Estonian government and economy were crippled by a large and coordinated cyber attack (primarily from distributed denials of service) on government and private organizations in 2007. The Estonian attacks were a watershed event triggered by the government-led movement of a memorial to the Soviet-led liberation of the country from Nazi Germany to a less prominent location in the city of Tallinn. The ensuing riots and cyber-violence catalyzed a broader international discussion about cyberwarfare (Herzog, 2011). While the cyber attacks in Estonia and the breach at Target had vastly different objectives and used totally different approaches, they illustrate the unanticipated security consequences of embracing increasing connectivity.

In response to these new threats, US public companies are beginning to receive guidance from the Securities and Exchange Commission (SEC) on requirements for investor disclosures related to attacks and compromised networks (SEC, 2011). With a number of high-profile attacks in 2013 and 2014, more regulation is likely on the way (Cleary and Eades, 2014). Organizations such as the North American Electric Reliability Corporation (NERC)—which sets the standards for utility best practices in North America pending regulatory approval—are also conducting scenario-based assessments and issuing guidance about how to protect critical infrastructure from these new threats (FERC, 2013b; NERC, 2012a).

Type
Chapter
Information
Driven by Demand
How Energy Gets its Power
, pp. 166 - 188
Publisher: Cambridge University Press
Print publication year: 2015

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×