Information Security: TVA Needs to Enhance Security of Critical Infrastructure Control Systems and Networks

Information Security: TVA Needs to Enhance Security of Critical Infrastructure Control Systems and Networks

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

Published: 2009-02

Total Pages: 15

ISBN-13: 1437905943

DOWNLOAD EBOOK

The control systems that regulate the nation¿s critical infrastructures face risks of cyber threats, system vulnerabilities, and potential attacks. Securing these systems is therefore vital to ensuring national security, economic well-being, and public health and safety. While most critical infrastructures are privately owned, the Tennessee Valley Authority (TVA), a fed. corp. and the nation¿s largest public power company, provides power and other services to a large swath of the American Southeast. This testimony discusses the security controls in place over TVA¿s critical infrastructure control system. The author examined the security practices in place at TVA facilities, and analyzed the agency¿s information security policies, plans, and procedures.


Information Security

Information Security

Author: United States Accounting Office (GAO)

Publisher: Createspace Independent Publishing Platform

Published: 2018-05-21

Total Pages: 30

ISBN-13: 9781719416405

DOWNLOAD EBOOK

Information Security: TVA Needs to Enhance Security of Critical Infrastructure Control Systems and Networks


Industrial Network Security

Industrial Network Security

Author: Eric D. Knapp

Publisher: Syngress

Published: 2014-12-09

Total Pages: 460

ISBN-13: 0124201849

DOWNLOAD EBOOK

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. - All-new real-world examples of attacks against control systems, and more diagrams of systems - Expanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 - Expanded coverage of Smart Grid security - New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering


Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Cybersecurity: Continued Efforts Are Needed to Protect Information Systems Form Evolving Threats

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

Published: 2010-11

Total Pages: 24

ISBN-13: 1437925650

DOWNLOAD EBOOK

Pervasive and sustained cyber attacks continue to pose a potentially devastating threat to the systems and operations of the fed. government. In recent months, fed. officials have cited the continued efforts of foreign nations and criminals to target government and private sector networks; terrorist groups have expressed a desire to use cyber attacks to target the U.S.; and press accounts have reported attacks on the Web sites of government agencies. This statement describes: (1) cyber threats to fed. information systems and cyber-based critical infrastructures; (2) control deficiencies at fed. agencies that make these systems and infrastructures vulnerable to cyber threats; and (3) opportunities that exist for improving fed. cybersecurity.


Information Security

Information Security

Author: Gregory C. Wilshusen

Publisher: DIANE Publishing

Published: 2009-11

Total Pages: 66

ISBN-13: 1437919383

DOWNLOAD EBOOK

Weaknesses in info. security (IS) are a widespread problem that can have serious consequences -- such as intrusions by malicious users, compromised networks, and the theft of intellectual property and personally identifiable info. -- and has identified IS as a governmentwide high-risk issue since 1997. Concerned by reports of significant vulnerabilities in fed. computer systems, Congress passed the Fed. IS Mgmt. Act of 2002 (FISMA), which authorized and strengthened IS program, evaluation, and reporting requirements for fed. agencies. This report evaluates: (1) the adequacy and effectiveness of agencies' IS policies and practices; and (2) fed. agencies' implementation of FISMA requirements. Includes recommendations. Illustrations.


Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity

Author:

Publisher:

Published: 2018

Total Pages: 48

ISBN-13:

DOWNLOAD EBOOK

The Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.


Defense Critical Infrastructure

Defense Critical Infrastructure

Author: Davi M. D'Agostino

Publisher: DIANE Publishing

Published: 2011

Total Pages: 91

ISBN-13: 143792459X

DOWNLOAD EBOOK

This is a print on demand edition of a hard to find publication. DoD relies overwhelmingly on commercial electrical power grids for secure, uninterrupted electrical power supplies to support its critical assets and is the single largest consumer of energy in the U.S. In 2008, it was reported that "[c]ritical national security and homeland defense missions are at an unacceptably high risk of extended outage from failure of the grid". Commercial electrical power grids have become increasingly fragile and vulnerable to extended disruptions that could severely impact DoD's critical assets. This report addresses these issues and argues that with more detailed knowledge of the assets' risks and vulnerabilities to electrical power disruptions, DoD can better avoid compromising crucial DoD-wide missions during electrical power disruptions.


Effective Model-Based Systems Engineering

Effective Model-Based Systems Engineering

Author: John M. Borky

Publisher: Springer

Published: 2018-09-08

Total Pages: 788

ISBN-13: 3319956698

DOWNLOAD EBOOK

This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.