2016
DOI: 10.2172/1337873
|View full text |Cite
|
Sign up to set email alerts
|

Cyber Threat and Vulnerability Analysis of the U.S. Electric Sector

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(10 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…The spies aimed to gain information about critical infrastructure specifications using network mapping tools. The communications throughout the U.S. power grid are enabled by various well-known protocols such as Modbus, DNP3, and IEC 61850 [39]. However, the technical details of the attack still remain vague.…”
Section: A Security Incidents In Scada Systemsmentioning
confidence: 99%
“…The spies aimed to gain information about critical infrastructure specifications using network mapping tools. The communications throughout the U.S. power grid are enabled by various well-known protocols such as Modbus, DNP3, and IEC 61850 [39]. However, the technical details of the attack still remain vague.…”
Section: A Security Incidents In Scada Systemsmentioning
confidence: 99%
“…Integration of ICS networks with internet-connected networks has made them vulnerable to cyber attack [18]. Despite this increased risk, networking is often an operational requirement for processes where system components are difficult to access or geographically distant.…”
Section: Networked Industrial Control Systemsmentioning
confidence: 99%
“…The inclusion of the aforementioned components within T&D systems, however, increases the threat surface. Vulnerabilities of such units can be ported to the power grid [7], while insecure control networks and protocol implementations further exacerbate the problem [8]- [10]. We refer to mission-critical system assets that can jeopardize grid operations if compromised by malicious actors as crownjewels [11].…”
Section: Threat Modeling and Risk Assessmentmentioning
confidence: 99%