File:CYBER SECURITY FOR CRITICAL ENERGY INFRASTRUCTURE (IA cybersecurityfor1094560378).pdf
Original file (1,275 × 1,650 pixels, file size: 817 KB, MIME type: application/pdf, 92 pages)
Captions
Summary[edit]
CYBER SECURITY FOR CRITICAL ENERGY INFRASTRUCTURE ( ) | ||
---|---|---|
Author |
Clemente, Jason F. |
|
Title |
CYBER SECURITY FOR CRITICAL ENERGY INFRASTRUCTURE |
|
Publisher |
Monterey, CA; Naval Postgraduate School |
|
Description |
The United States power grid is a logical target for a major cyber attack because it connects all of the nation’s critical infrastructures with electricity. Hackers consistently exploit vulnerabilities of the bulk power system and are close to being able to disrupt electrical distribution. We live in a world that is interconnected, from personal online banking to government infrastructure; consequently, network security and defense are needed to safeguard the digital information and controls for these systems. The cyber attack topic has developed into a national interest because high-profile network breaches have introduced fear that computer network hacks and other security-related attacks have the potential to jeopardize the integrity of the nation’s critical infrastructure. The national and economic security of the United States depends on a reliable, functioning critical infrastructure. A comprehensive understanding of the effects of a massive power failure may help promote changes in the way cyber security is run on our most important critical infrastructure: the national power grid. This study investigates the robustness of the power grid’s network system, the collaboration between public and private sectors against cyber threats, and mitigation requirements in areas of weakened controls such as program planning and management, access controls, application software development, and system software and service continuity controls. Subjects: cyber security; cyber attack; critical tools; power grid; Homeland Security; NIPP; NICC |
|
Language | English | |
Publication date | September 2018 | |
Current location |
IA Collections: navalpostgraduateschoollibrary; fedlink |
|
Accession number |
cybersecurityfor1094560378 |
|
Source | ||
Permission (Reusing this file) |
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States. |
Licensing[edit]
Public domainPublic domainfalsefalse |
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code.
Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.
|
||
This file has been identified as being free of known restrictions under copyright law, including all related and neighboring rights. |
https://creativecommons.org/publicdomain/mark/1.0/PDMCreative Commons Public Domain Mark 1.0falsefalse
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 11:26, 16 July 2020 | 1,275 × 1,650, 92 pages (817 KB) | Fæ (talk | contribs) | FEDLINK - United States Federal Collection cybersecurityfor1094560378 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #12832) |
You cannot overwrite this file.
File usage on Commons
The following page uses this file:
Metadata
This file contains additional information such as Exif metadata which may have been added by the digital camera, scanner, or software program used to create or digitize it. If the file has been modified from its original state, some details such as the timestamp may not fully reflect those of the original file. The timestamp is only as accurate as the clock in the camera, and it may be completely wrong.
Short title | CYBER SECURITY FOR CRITICAL ENERGY INFRASTRUCTURE |
---|---|
Image title | |
Author | Clemente, Jason F. |
Software used | Clemente, Jason F. |
Conversion program | Adobe PDF Library 11.0 |
Encrypted | no |
Page size | 612 x 792 pts (letter) |
Version of PDF format | 1.4 |