AWWA IMTECH55809 PDF

AWWA IMTECH55809 PDF

Name:
AWWA IMTECH55809 PDF

Published Date:
01/01/2002

Status:
Active

Description:

Understanding and Minimizing Security Risk for Computer Information Systems

Publisher:
American Water Works Association

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$7.2
Need Help?
As the water industry's reliance on computers, computer networks and automated information systems continues to increase so does it's vulnerability to intentional and unintentional security breaches such as plant miss-operation, data corruption and inappropriate data access. Computer information system security breaches or cyber terrorism may result in process upsets potentially impacting the water supply, loss of critical operations data or distribution of incomplete or erroneous data. For example, many utilities have employed supervisory controls and data acquisition (SCADA) systems to improve monitoring, process control, compliance, security, and overall reliability. Experienced hackers or those with specific knowledge about the system can access remotely accessible SCADA systems. Once logged in, properly equipped hackers can deactivate process alarms, change chemical federates, start/stop equipment, and so on. The results of this intrusion can pose a wide variety of environmental, health and safety concerns for employees and the general public. The computer systems, computer network components and interfaces, as well as the applications used in the water industry have built-in security features that can significantly reduce the risk of security breaches. However, even when all security features are in force, cyber terrorism still posses a threat and systems are still susceptible to some risks. Even though there is an increased security awareness due to the recent terrorist attacks on the United States, water utilities are reminded that a water utility cyber attack by terrorists is less likely than a cyber attack from a disgruntled employee. This paper reviews the security features available and how they can be used to reduce security risks. It also presents some of the security "gaps" and methods for minimizing the risk exposure resulting from these gaps. Includes 8 references, figures.
Edition : Vol. - No.
File Size : 1 file , 760 KB
Note : This product is unavailable in Ukraine, Russia, Belarus
Number of Pages : 12
Published : 01/01/2002

History


Related products

AWWA IMTECH55803
Published Date: 01/01/2002
The Technical Challenges of Creating Good, Fully Detailed Hydraulic Models of Water Distribution Systems
$7.2
AWWA IMTECH55837
Published Date: 01/01/2002
Incorporating Variability and Uncertainty in Treatment Plant Design
$7.2
AWWA IMTECH55831
Published Date: 01/01/2002
A Modern Approach to Broadband Telecommunication Networks
$7.2
AWWA IMTECH55818
Published Date: 01/01/2002
City of Naperville, IL Utilizes Web Based Technology to Enchance Monitoring Capabilities at Both Water and Wastewater Facilities
$7.2

Best-Selling Products

PCA DX074D
Published Date:
High Strength Bars as Concrete Reinforcement, Part 6. Fatigue Tests
PCA DX093D
Published Date:
Fatigue Tests of Reinforcing Bars
PCA DX139P
Published Date:
Influence of Aggregate Properties on Effectiveness of Interlock Joints in Concrete Pavements
PCA DX145D
Published Date:
Fatigue Tests of Reinforcing Bars-Effect of Deformation Pattern
PCA EB001.15
Published Date: 2011
Design and Control of Concrete Mixtures, 15th edition
PCA EB001.16
Published Date: 2016
Design and Control of Concrete Mixtures, 16th edition