AWWA IMTECH55809 PDF

AWWA IMTECH55809 PDF

Name:
AWWA IMTECH55809 PDF

Published Date:
01/01/2002

Status:
Active

Description:

Understanding and Minimizing Security Risk for Computer Information Systems

Publisher:
American Water Works Association

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$7.2
Need Help?
As the water industry's reliance on computers, computer networks and automated information systems continues to increase so does it's vulnerability to intentional and unintentional security breaches such as plant miss-operation, data corruption and inappropriate data access. Computer information system security breaches or cyber terrorism may result in process upsets potentially impacting the water supply, loss of critical operations data or distribution of incomplete or erroneous data. For example, many utilities have employed supervisory controls and data acquisition (SCADA) systems to improve monitoring, process control, compliance, security, and overall reliability. Experienced hackers or those with specific knowledge about the system can access remotely accessible SCADA systems. Once logged in, properly equipped hackers can deactivate process alarms, change chemical federates, start/stop equipment, and so on. The results of this intrusion can pose a wide variety of environmental, health and safety concerns for employees and the general public. The computer systems, computer network components and interfaces, as well as the applications used in the water industry have built-in security features that can significantly reduce the risk of security breaches. However, even when all security features are in force, cyber terrorism still posses a threat and systems are still susceptible to some risks. Even though there is an increased security awareness due to the recent terrorist attacks on the United States, water utilities are reminded that a water utility cyber attack by terrorists is less likely than a cyber attack from a disgruntled employee. This paper reviews the security features available and how they can be used to reduce security risks. It also presents some of the security "gaps" and methods for minimizing the risk exposure resulting from these gaps. Includes 8 references, figures.
Edition : Vol. - No.
File Size : 1 file , 760 KB
Note : This product is unavailable in Ukraine, Russia, Belarus
Number of Pages : 12
Published : 01/01/2002

History


Related products

AWWA IMTECH55803
Published Date: 01/01/2002
The Technical Challenges of Creating Good, Fully Detailed Hydraulic Models of Water Distribution Systems
$7.2
AWWA IMTECH55837
Published Date: 01/01/2002
Incorporating Variability and Uncertainty in Treatment Plant Design
$7.2
AWWA IMTECH55831
Published Date: 01/01/2002
A Modern Approach to Broadband Telecommunication Networks
$7.2
AWWA IMTECH55818
Published Date: 01/01/2002
City of Naperville, IL Utilizes Web Based Technology to Enchance Monitoring Capabilities at Both Water and Wastewater Facilities
$7.2

Best-Selling Products

UNE-CEN ISO/TR 14969:2006 IN
Published Date: 02/15/2006
Medical devices - Quality management systems - Guidance on the application of ISO 13485:2003 (ISO/TR 14969:2004)
UNE-CEN ISO/TR 15462:2010 IN
Published Date: 09/15/2010
Water quality - Selection of tests for biodegradability (ISO/TR 15462:2006)
UNE-CEN ISO/TR 15608:2006 IN
Published Date: 07/19/2006
Welding - Guidelines for a metallic materials grouping system (ISO/TR 15608:2005)
UNE-CEN ISO/TR 17844:2007 IN
Published Date: 09/26/2007
Welding - Comparison of standardised methods for the avoidance of cold cracks (ISO/TR 17844:2004)
UNE-CEN ISO/TR 20572:2008 IN
Published Date: 12/17/2008
Footwear - Performance requirements for components for footwear - Accessories (ISO/TR 20572:2007)
UNE-CEN ISO/TR 20573:2009 IN
Published Date: 05/13/2009
Footwear - Performance requirements for components for footwear - Heels and top pieces (ISO/TR 20573:2006)