Pervasive and sustained computer-based (cyber) attacks against federal and private-sector infrastructures pose a potentially devastating impact to systems and operations and the critical infrastructures that they support. Congress and the Executive Branch, including the new administration, have taken actions to examine the adequacy of Pres. Bush¿s strategy and identify areas for improvement. This report summarizes: (1) key reports and recommendations on the national cyber-security strategy; and (2) the views of experts on how to strengthen the strategy. The auditor conducted panel discussions with key cyber-security experts to solicit their views on areas for improvement. Illustrations.
This book presents the contributions from a workshop entitled "Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT," which was organized in the Netherlands in May 2009.
The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical. Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.
The control systems that regulate the nation¿s critical infrastructures face risks of cyber threats, system vulnerabilities, and potential attacks. Securing these systems is therefore vital to ensuring national security, economic well-being, and public health and safety. While most critical infrastructures are privately owned, the Tennessee Valley Authority (TVA), a fed. corp. and the nation¿s largest public power company, provides power and other services to a large swath of the American Southeast. This testimony discusses the security controls in place over TVA¿s critical infrastructure control system. The author examined the security practices in place at TVA facilities, and analyzed the agency¿s information security policies, plans, and procedures.