• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Industry News   »   Current News   »   IT pros concerned about smart grid security

IT pros concerned about smart grid security

  • Posted on:September 6, 2011
  • Posted in:Current News
  • Posted by:
    Trend Micro
0

More than three-quarters of IT professionals are concerned with the United States’ smart grid and officials’ ability to keep it safe from cyberattacks and other threats, a new study found.

The study, published by data compliance solutions provider nCircle, noted that smart grid data security, which protects the nation’s smart meters and power plant control systems, among other things, is becoming an increasingly troubling issue for IT professionals in the industry.

In a survey of 544 IT security professionals, 77 percent said smart grid cybersecurity is a concern, as a cyberattack or virus could result in significant damages to the Unites States’ infrastructure.

“It’s not surprising that the majority of respondents is concerned. The smart grid initiative involves aggressive deployment of a network device – in this case a smart meter – to nearly every household in America,” said nCircle director of product management Tim Erlin in a release. “That’s quite a target surface for a Stuxnet-type attack.”

The smart grid has a different meaning depending on where it is being employed. In the United States, the term refers to the modernization of the nation’s electricity infrastructure, including distribution and transmission channels, through technological advancements. Smart meters, for example, are digital devices that record electricity consumption and share that information with a central system, often for data analysis.

But, like any relatively new technology, the utilization of smart grid technology presents new data security challenges with which IT professionals must contend.

One state that’s taking initiative to protect its smart grid is California, which has been an early adopter of the infrastructure. The state’s Public Utilities Commission recently proposed a ruling that puts pressure on utility companies to improve security both on their internal and consumer-facing networks. The ruling also established consumer privacy standards regarding the smart reader infrastructure that, according to an IDC report, are in line with guidelines by the Fair Information Principle and the Department of Homeland Security.

According to IDC, the utilities the new ruling affects – Pacific Gas & Electric, Southern California Edison and San Diego Gas – will be closely monitored by the commission to ensure security and privacy standards are met and consumer information remains safe.

Other states may soon consider following California’s lead, as failure to take the steps necessary to protect the smart grid could result in hackers taking control of the nation’s electricity infrastructure, severely damaging the country’s ability to operate. In the event of cyber warfare, this could have devastating implications.

Related posts:

  1. Utilities will focus on securing smart grids
  2. US electrical grid at rising risk from cyber attacks
  3. Accelerated investment may have compromised smart grid cybersecurity
  4. Audit finds rush to update smart grid left system vulnerable

Security Intelligence Blog

  • Obfuscation Tools Found in the Capesand Exploit Kit Possibly Used in “KurdishCoder” Campaign
  • Mobile Cyberespionage Campaign Distributed Through CallerSpy Mounts Initial Phase of a Targeted Attack
  • Operation ENDTRADE: Finding Multi-Stage Backdoors that TICK

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Answering IoT Security Questions for CISOs
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • How To Be An Informed Skeptic About Security Predictions
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Trend Micro Selected as Launch Partner for AWS Ingress Routing Service and Stalkerware on the Rise
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • The Shared Responsibility Model
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • What Worries CISOs Most In 2019

Follow Us

Trend Micro In The News

  • Trend Micro Takes On Palo Alto Networks With Cloud Conformity Buy
  • Trend Micro Partners with Snyk to Fix Vulnerabilities for DevOps
  • Trend Micro Partners With Snyk To Advance DevSecOps
  • Hackers to stress-test Facebook Portal at hacking contest
  • NEW TECH: Trend Micro inserts 'X' factor into 'EDR' - endpoint detection response
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.