The Community for Technology Leaders
RSS Icon
Issue No.01 - January/February (2010 vol.8)
pp: 60-63
Fred Cohen , California Sciences Institute
In the US, tens of millions of "smart meters," which are vulnerable to remote exploitation, viruses, worms, malicious upgrades, and all manner of other attacks, have been deployed. Attackers can and already have used these meters, on a small scale, to disable the power infrastructure and cause both long-term physical damage to it and harm to the public. These deployments and other related control mechanisms will be expanded in the coming years, as a necessary step toward better energy efficiency and to enable the next generation of electrical systems to integrate into the grid. The question is, how can we make this deployment safe and secure?
smart grid, security
Fred Cohen, "The Smarter Grid", IEEE Security & Privacy, vol.8, no. 1, pp. 60-63, January/February 2010, doi:10.1109/MSP.2010.52
1. J.M. Weiss, "Control Systems Cyber Security—the Current Status of Cyber Security of Critical Infrastructures," US Senate Committee on Commerce, Science, and Transportation, 19 Mar. 2009; WeissTestimony.pdf.
2. F. Cohen, Protection and Security on the Information Superhighway, John Wiley &Sons, 1995.
3. F. Cohen, "Simulating Cyber Attacks, Defences, and Consequences," Computers &Security, vol. 18, no. 6, 1999, pp. 479–518.
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool