Con Edison has also developed a SCADA-controlled switch that can be used in manholes.
However, other researchers have found many weaknesses in the software used to control Scada systems via the net.
"No matter what you do, the customer always wants everything for free, " says Paul Skare, the manager of Scada development at Siemens.
The AGA Cryptography Working Group was subsequently formed to examine how encryption could be used to help protect SCADA systems from attack.
FORBES: Rockefeller Admits Congress Lacks Foundation for Cybersecurity Legislation
By contrast, conventional monitoring technologies like supervisory control and data acquisition (SCADA) measure every two to four seconds without precise time synchronization.
It takes control of the facility's SCADA (supervisory control and data acquisition system) and through it, is able to destroy the facility.
The survey was carried out by Bob Radvanovsky and Jacob Brodsky of security consultancy InfraCritical who investigated the potential threat to so-called Scada systems.
Within the next seven days, Rockwell Automation will release a patch for a supervisory control and data acquisition (SCADA) vulnerability first made public last Friday.
Now they have revealed dozens of vulnerabilities in the supervisory, control and data acquisition (SCADA) software that much national infrastructure and manufacturing industry depends upon.
FORBES: Increased Computerization Means Increased Vulnerability
The spy program is a sophisticated rootkit designed to steal data from SCADA networks, the type of software that control energy utilities, transportation, and other vital systems.
Scada (Supervisory Control and Data Acquisition) is the industry term for the computers behind the machinery in power plants, water treatment centres, traffic controls and other utilities.
In their search scripts the pair used 600 terms compiled from lists of Scada manufacturers and the names and product numbers of the control systems they sell.
In that letter, he inquired about an AGA report called AGA-12 and efforts by the AGA to develop security standards for SCADA systems (supervisory control and data acquisition).
FORBES: Rockefeller Admits Congress Lacks Foundation for Cybersecurity Legislation
This would ensure that popular vectors, developed by cyber criminals to attack and control the target rich consumer space would not also lead to infections of SCADA controllers, transaction processors, or real time environments.
Here are two credible threats to global systems: a massive cyber attack that could spread to the rest of world and interfere with SCADA systems everywhere and carbon whiskers that could short out power transmission systems.
FORBES: Why There Could Be Collateral Damage From An Israeli First Strike On Iran
Also, given the nature of these systems (industrial software that controls power plants, like SCADA systems), it would have to be developed in a replication of the target environment an immense cost to reconstruct and an effort in intelligence collection.
FORBES: The New York Times Fails To Deliver Stuxnet's Creators
On Monday, Dillon Beresford, an analyst for security auditing firm NSS Labs, took aim at Siemens in a message to a mailing list devoted to supervisory control and data acquisition (SCADA) software used in physical systems like power plants and factories.
FORBES: Siemens Accused Of Whitewashing Critical Security Bugs
It took Schaeffer only five months to analyze the setup and write code that would let him, from his laptop, tell the Scada system to open and close enough breakers to bring down the mock utility--without letting the legitimate operator see what was going on.
Over the past week, computer experts in Italy, Russia and the US have posted details online on a clutch of vulnerabilities they have found in various SCADA packages used to automate installations as diverse as power stations, water purification plants, oil refineries, food factories, breweries and steel plants.
FORBES: Increased Computerization Means Increased Vulnerability
With support for a wide array of input and output options and a large number of protocols available in the industry including IEC 61850, DNP3.0, and IEC60870-5-104, GE has the ability to connect and integrate your power system equipment with virtually any HMI, SCADA or Energy Management System with the security, reliability and dependability you expect from GE.
应用推荐