https://urgentcomm.com/wp-content/themes/ucm_child/assets/images/logo/footer-new-logo.png
  • Home
  • News
  • Multimedia
    • Back
    • Multimedia
    • Video
    • Podcasts
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2022 Winter Showcase
    • IWCE 2023 Pre-event Guide
  • Commentary
    • Back
    • Commentary
    • Urgent Matters
    • View From The Top
    • All Things IWCE
    • Legal Matters
  • Resources
    • Back
    • Resources
    • Webinars
    • White Papers
    • Reprints & Reuse
  • IWCE
    • Back
    • IWCE
    • Conference
    • Special Events
    • Exhibitor Listings
    • Premier Partners
    • Floor Plan
    • Exhibiting Information
    • Register for IWCE
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Terms of Service
    • Privacy Statement
    • Cookie Policy
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • Mission Critical Technologies
    • TU-Auto
  • In the field
    • Back
    • In the field
    • Broadband Push-to-X
    • Internet of Things
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Call Center/Command
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Network Tech
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Operations
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Regulations
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • Organizations
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
Urgent Communications
  • NEWSLETTER
  • Home
  • News
  • Multimedia
    • Back
    • Video
    • Podcasts
    • Omdia Crit Comms Circle Podcast
    • Galleries
    • IWCE’s Video Showcase
    • IWCE 2023 Pre-event Guide
    • IWCE 2022 Winter Showcase
  • Commentary
    • Back
    • All Things IWCE
    • Urgent Matters
    • View From The Top
    • Legal Matters
  • Resources
    • Back
    • Webinars
    • White Papers
    • Reprints & Reuse
    • UC eZines
    • Sponsored content
  • IWCE
    • Back
    • Conference
    • Why Attend
    • Exhibitor Listing
    • Floor Plan
    • Exhibiting Information
    • Join the Event Mailing List
  • About Us
    • Back
    • About Us
    • Contact Us
    • Advertise
    • Cookie Policy
    • Terms of Service
    • Privacy Statement
  • Related Sites
    • Back
    • American City & County
    • IWCE
    • Light Reading
    • IOT World Today
    • TU-Auto
  • newsletter
  • In the field
    • Back
    • Internet of Things
    • Broadband Push-to-X
    • Project 25
    • Public-Safety Broadband/FirstNet
    • Virtual/Augmented Reality
    • Land Mobile Radio
    • Long Term Evolution (LTE)
    • Applications
    • Drones/Robots
    • IoT/Smart X
    • Software
    • Subscriber Devices
    • Video
  • Call Center/Command
    • Back
    • Artificial Intelligence
    • NG911
    • Alerting Systems
    • Analytics
    • Dispatch/Call-taking
    • Incident Command/Situational Awareness
    • Tracking, Monitoring & Control
  • Network Tech
    • Back
    • Cybersecurity
    • Interoperability
    • LMR 100
    • LMR 200
    • Backhaul
    • Deployables
    • Power
    • Tower & Site
    • Wireless Networks
    • Coverage/Interference
    • Security
    • System Design
    • System Installation
    • System Operation
    • Test & Measurement
  • Operations
    • Back
    • Critical Infrastructure
    • Enterprise
    • Federal Government/Military
    • Public Safety
    • State & Local Government
    • Training
  • Regulations
    • Back
    • Narrowbanding
    • T-Band
    • Rebanding
    • TV White Spaces
    • None
    • Funding
    • Policy
    • Regional Coordination
    • Standards
  • Organizations
    • Back
    • AASHTO
    • APCO
    • DHS
    • DMR Association
    • ETA
    • EWA
    • FCC
    • IWCE
    • NASEMSO
    • NATE
    • NXDN Forum
    • NENA
    • NIST/PSCR
    • NPSTC
    • NTIA/FirstNet
    • P25 TIG
    • TETRA + CCA
    • UTC
acc.com

Call Center/Command


Panel: SCADA systems at risk for intrusion attack

Panel: SCADA systems at risk for intrusion attack

ORLANDO—A panel of public utility executives speaking at the Homeland Security for Networked Industries conference here agreed that remote monitoring and control systems, particularly SCADA systems, are vulnerable to intrusion attacks and should be protected more vigilantly
  • Written by Urgent Communications Administrator
  • 11th January 2006

ORLANDO—A panel of public utility executives speaking at the Homeland Security for Networked Industries conference here agreed that remote monitoring and control systems, particularly SCADA systems, are vulnerable to intrusion attacks and should be protected more vigilantly. They also said that utilities would be well served to link disaster recovery and business continuity plans.

“I’m worried about SCADA,” said Brunson White of Energen. “It is largely misunderstood, and we don’t have as much control over it as we think we do.”

Utilities haven’t thought enough about intrusion attacks when they develop security plans, said Denny Brown of Pinnacle West, the state of Arizona’s largest energy company, which also operates the state’s largest nuclear power plant. “We have to think differently than we did before,” Brown said. “We didn’t think about the bad guys being out there wanting to get into our networks and do nasty things.”

Ray Johnson of Entergy agreed, adding that a false sense of security exists because terrorists have yet to take down a major power plant in the U.S. “A lot of people think it won’t or can’t happen,” he said. But the economic and societal impact would be enormous should such an event occur, and that’s something utility executives and public utility commissions should be thinking about, he said. “If someone takes a nuclear plant offline, that will definitely get on CNN.

It’s a legitimate threat, said David Weber of NW Natural, a small gas distribution utility serving western Oregon and southwestern Washington. “We know [terrorists] have copies of [utilities’] SCADA system designs,” he said, further suggesting that utilities invest in intrusion-detection systems if they haven’t already done so. “They provide the ability to know how they’re exploiting you. They’re not that expensive and offer the most bang for the buck,” Weber said, adding that SCADA systems only are as secure as the Windows operating systems they ride over.

According to Johnson, intrusion detection is “high on our list.” He also said that Entergy is high on network performance monitoring, which he said could raise red flags. “We try to take several tools and correlate them,” he said. “Nine out of 10 times [the notification] is benign, caused by an internal application. But you have to be concerned about the one that will end up in the newspaper.”

Terrorists always are on the lookout for opportunities, Brown said. He told of a Washington Post story that identified a specific power plant as the number one terrorist target. The next day the plant recorded 200,000 denial-of-service attacks.

Traditionally, security has taken a back seat to other more pressing matters because of budget pressures created by cost-conscious public utility commissions. That has to stop, Johnson said.

“You just can’t push certain things back any longer,” he said. “You might have to take money from other areas, and you might irritate some people by canceling projects. So what? And if you haven’t been able to make the case, scream louder or bring someone else in who can [make the case].”

Brown agreed. “It’s like health—if you have it, you don’t want to spend money on it. But once you lose it, you spend a lot of money to get it back.”

The spate of natural disasters that have afflicted the U.S.—the four major hurricanes that struck the Gulf Coast states in 2004 and Hurricane Katrina last year—along with the prospect for terrorist or hacker attacks that could take their systems down have forced utilities to rethink their recovery strategies.

“Every year, we’re threatened by hurricanes, tornadoes, floods and ice storms, and every year we go through our disaster-recovery plan. But up until now, we didn’t focus much on business recovery,” said Johnson, whose utility has the city of New Orleans in its footprint.

That all changed after Katrina. In April, Entergy conducted a mock disaster to determine what would occur if its employees were forced out of their offices for a week. In August the mock scenario became reality, but this time workers were displaced for weeks.

“Each year we do a drill that stresses our plan. Typically we try to create a worst-case scenario. This year we found out it wasn’t.”

Nevertheless, the April drill proved effective, Johnson said. “The fact we brought some of these things up sped up the response from [upper management],” after Katrina struck.

Johnson added that he “can’t stress enough,” the importance of linking disaster-recovery and business-continuity plans. “Less than 24 hours after the levees broke, we realized we would have to implement our business recovery plan,” he said.

Brown agreed. “Katrina has forced us to think outside the box. We no longer can say it can’t happen here. We can’t prevent [disasters], but we can figure out what we have to do to respond. We have to take a Boy Scouts approach—be prepared.”

Tags: Call Center/Command content Operations Public Safety Wireless Networks

Most Recent


  • Lynk inks New Zealand deals seeking cash to grow satellite fleet
    In the first few days of June, Lynk Global made two announcements relating to New Zealand – the first being a successful trial of satellite-enabled texting with local telco 2Degrees and the other a partnership with another operator, Spark. While the company’s technology holds the promise to improve connectivity in areas with zero coverage, more […]
  • Barracuda warns all of its ESG appliances need urgent rip & replace
    Despite pushing out patches addressing vulnerabilities in its Email Security Gateway (ESG) appliances in May, today Barracuda issued an urgent warning that all affected devices need to be taken offline and replaced immediately. The ESG remote command injection vulnerability, tracked under CVE-2023-2868, was already under active exploit since October 2022, Barracuda said in its initial May […]
  • NTT Docomo sees smart surfaces as key to 6G
    Could smart surface tech be one of the keys to 6G radio? The 6G network will have to do a lot of heavy lifting in very high frequency bands, requiring dense clusters of very low cost transmitters and receivers. NTT Docomo is advancing the idea of metasurface reflectors that dynamically redirect signals to mobile devices […]
  • Where local governments must allocate federal funds to support the future of cybersecurity
    This past February, the Department of Homeland Security’s State and Local Cybersecurity Grant Program began to distribute funds to states with approved cybersecurity plans. For budget and resource strapped state, local and territorial governments (STLGs), these grants enable crucial cybersecurity investments to protect our nation from unprecedented cybersecurity risks and help bridge the gap between current funding […]

Leave a comment Cancel reply

To leave a comment login with your Urgent Comms account:

Log in with your Urgent Comms account

Or alternatively provide your name, email address below:

Your email address will not be published. Required fields are marked *

Related Content

  • New Orleans-area 911 center inks multiyear APEX deal with Carbyne to replace call-handling system
  • Panel: SCADA systems at risk for intrusion attack
    Newscan: Feds recover millions from pipeline ransom hackers, hint at U.S. Internet tactic
  • Cyber is the new Cold War, and AI is the arms race
  • Private wireless networks in the US start going public

Commentary


Updated: How ‘sidelink’ peer-to-peer communications can enhance public-safety operations

  • 1
27th February 2023

NG911 needed to secure our communities and nation

24th February 2023

How 5G is making cities safer, smarter, and more efficient

26th January 2023
view all

Events


UC Ezines


IWCE 2019 Wrap Up

13th May 2019
view all

Twitter


Newsletter

Sign up for UrgentComm’s newsletters to receive regular news and information updates about Communications and Technology.

Expert Commentary

Learn from experts about the latest technology in automation, machine-learning, big data and cybersecurity.

Business Media

Find the latest videos and media from the market leaders.

Media Kit and Advertising

Want to reach our digital and print audiences? Learn more here.

DISCOVER MORE FROM INFORMA TECH

  • American City & County
  • IWCE
  • Light Reading
  • IOT World Today
  • Mission Critical Technologies
  • TU-Auto

WORKING WITH US

  • About Us
  • Contact Us
  • Events
  • Careers

FOLLOW Urgent Comms ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2023 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.