TITLE

Energy Security Pros Believe Smart Meters Vulnerable to False Data Injection

PUB. DATE
April 2012
SOURCE
Transmission & Distribution World Exclusive Insight;4/10/2012, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the results of a survey participated by 104 energy security professionals in the U.S. and sponsored by energy firms nCircle and EnergySec. It says that more than 50 per cent of respondents agree that smart meter installations do not have enough security controls to protect against false data injection. According to the author, false data injection attacks exploit power grids' configuration through arbitrary errors.
ACCESSION #
75649714

 

Related Articles

  • Building a Worthy Case For Data Protection.  // Bank Technology News;Sep2003, Vol. 16 Issue 9, p51 

    Focuses on the measurement of the business value of data protection through Net Present Value (NPV) in the U.S. List of risk assessment steps for data protection; Significance of the steps for information technology professionals; Concept of NPV.

  • The Evolution of the Data Professional and You. GORBACHEV, ALEX // Database Trends & Applications;Mar2013, Vol. 27 Issue 1, p17 

    The article presents the results of a study on how the responsibilities of handling data are changing conducted by the Independent Oracle User's Group (IOUG). It shows in the results of the study that many data professionals are taking on responsibilities that are more associated with analysts...

  • nCircle Debuts PureCloud(tm), Revolutionary Security Scanning Technology.  // Biomedical Market Newsletter;5/17/2011, p5 

    The article offers brief information on nCircle PureCloudâ„¢ security scanning technology from nCircle.

  • CISSP! WHO CARES? Schultz, Beth // SC Magazine: For IT Security Professionals (15476693);May2011, Vol. 22 Issue 5, p24 

    The article discusses the significance of obtaining a Certified Information Systems Security Professional (CISSP) certification from the International Information Systems Security Certification Consotium. The reasons why information technology (IT) security professionals should seek...

  • Year of the Infosecurity Pro. Saita, Anne // Information Security;Jan2005, Vol. 8 Issue 1, p24 

    Presents information on the declaration by the International Information Systems Security Certification Consortium of 2005 as the Year of the Security Professional. Aim of improving the profile of security professionals; Expectations on such declaration.

  • PATCHING IT UP. Schweitzer, Douglas // Certification Magazine;Apr2004, Vol. 6 Issue 4, p36 

    An effective patch management program requires monitoring software vulnerabilities and identifying the available patches befitting an IT professional's needs. A patch is a piece of code added to an executable program, usually either as a fix for a discovered program flaw or to supplement the...

  • How does your enterprise defense stack up? Stephenson, Peter // SC Magazine: For IT Security Professionals (15476693);Nov2011, Vol. 22 Issue 11, p55 

    The article evaluates the nCircle Benchmark from nCircle.

  • Information security tops AICPA's tech list for 2005.  // Accounting Today;1/24/2005, Vol. 19 Issue 2, p20 

    Reports that information security is the number one technology concern in the U.S. according to the 2005 Top Technologies Survey of the American Institute of certified public accountants. Number of respondents that participated in the survey; Popularity of document management; Performance of...

  • An Investigation of Sport Marketing Competencies. Smolianov, Peter; Shilbury, David // Sport Marketing Quarterly;1996, Vol. 5 Issue 4, p27 

    This research examined sport marketing competencies considered by 103 professionals to be important for sport marketing administrators. Four job segments within the profession were surveyed and included: sport marketing firms, amateur sport organizations, professional sport organizations, and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics