{"id":11115,"date":"2019-03-11T10:17:27","date_gmt":"2019-03-11T10:17:27","guid":{"rendered":"https:\/\/www.engineernewsnetwork.com\/blog\/?p=11115"},"modified":"2019-03-11T10:17:31","modified_gmt":"2019-03-11T10:17:31","slug":"defending-attacks-on-critical-infrastructure","status":"publish","type":"post","link":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/","title":{"rendered":"Defending attacks on critical infrastructure"},"content":{"rendered":"\n<p><strong>Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential<\/strong><\/p>\n\n\n\n<p>Protocols for cyber security in the energy industry are often limited to the prevention of data breaches.&nbsp;<\/p>\n\n\n\n<p>However, by infiltrating energy generation sites, hackers have the potential to cause much more damage than simply accessing confidential data.&nbsp;<\/p>\n\n\n\n<p>According to predictions by security experts, British cities would be uninhabitable in a matter of days, should the National Grid ever be brought down by a cyber-attack.&nbsp;<\/p>\n\n\n\n<p>In fact, experts named cyber-attacks as one of few \u2018black sky hazards\u2019 that have the potential to destroy the grid for a prolonged period of time.&nbsp;<\/p>\n\n\n\n<p>Other hazards include naturally occurring threats such as earthquakes, solar storms and extreme terrestrial weather.&nbsp;<\/p>\n\n\n\n<p>Another study, undertaken by the UK\u2019s security services, predicted that the country would be just \u201cfour meals away from anarchy\u201d, in the case of a blackout situation. Clearly, we are a nation reliant on the grid.&nbsp;<\/p>\n\n\n\n<p>As the country embarks on energy transformation projects, investing in renewables, microgeneration sites and smart grids, some networks are increasingly vulnerable to attack. How can the energy industry protect its changing infrastructure?<\/p>\n\n\n\n<p><strong>Site responsibility<\/strong><\/p>\n\n\n\n<p>Britain\u2019s energy grid has transformed. The integration of renewable energy means the country\u2019s infrastructure must manage energy from various resources, creating a need for industrial automation and control systems to monitor the flow of energy.&nbsp;<\/p>\n\n\n\n<p>Connecting substations, control panels and generation assets, like individual turbines and solar panels, control systems act as the central nervous system of the grid.&nbsp;<\/p>\n\n\n\n<p>However, this surge of connectivity leaves the grid vulnerable.<\/p>\n\n\n\n<p>Back in 2015, Ukraine experienced blackouts linked to control systems of offshore wind farms.&nbsp;<\/p>\n\n\n\n<p>Due to the isolation of these facilities, hackers were able to disrupt power by gaining access through Supervisory Control and Data Acquisition (SCADA) software. The attack affected 225,000 homes and the grid took months to recover.&nbsp;<\/p>\n\n\n\n<p>So, who is accountable for security of these sites?&nbsp;<\/p>\n\n\n\n<p>Arguably, operators should take responsibility. However, these operatives are already responsible for energy generation, control and monitoring of notoriously volatile sites.&nbsp;<\/p>\n\n\n\n<p>Cyber security cannot be properly established without specialists in IT and automation and importantly, software that supports these security efforts.&nbsp;<\/p>\n\n\n\n<p><strong>Security by compliance<\/strong><\/p>\n\n\n\n<p>When choosing a vendor for grid or plant software, security should be a priority. However, operators can overlook the importance of ongoing security features \u2014 ensuring the software can protect from all threats, both today and in the future.&nbsp;<\/p>\n\n\n\n<p>Consider the Ukraine cyber-attack as an example. The system was relatively secure. Control systems were well-segmented from business networks and were said to have robust firewalls. <\/p>\n\n\n\n<p>However, the SCADA network that controlled the grid didn\u2019t require two-factor authentication. This allowed hackers to gain access to credentials and infiltrate the system.\u00a0<\/p>\n\n\n\n<p>Due to the high-profile nature of the attack, two-factor authentication is now considered a standard requirement. However, as security measures continue to heighten, the&nbsp; sophistication of hackers will too.&nbsp;<\/p>\n\n\n\n<p>Security features for energy grids cannot be static. Software should provide ongoing security updates throughout its entire lifespan. Otherwise, it could be unable to protect against new, emerging or unfamiliar threats.&nbsp;<\/p>\n\n\n\n<p>For this reason, the energy industry should select vendors with IEC 62443 certification.&nbsp;<\/p>\n\n\n\n<p>IEC 62443, of which COPA-DATA\u2019s &nbsp; zenon &nbsp; is compliant, provides a framework for closing security loopholes in industrial automation and control systems. It&nbsp; is awarded to vendors that demonstrate comprehensive security management.&nbsp;<\/p>\n\n\n\n<p>However, as it requires reverification each year, the process holds vendors accountable for protecting against new and emerging threats.<\/p>\n\n\n\n<p>The connectivity of today\u2019s energy grids can create areas of vulnerability. To protect against attacks, energy providers and facilities managers at renewable sites must select software that has been developed with security in mind \u2014 and deploy their systems in accordance to the relevant security standards.&nbsp;<\/p>\n\n\n\n<p>As Ukraine\u2019s incident demonstrates, cyber-attacks in energy can be incredibly damaging. Considering Britain\u2019s reliance on the grid, security cannot be an afterthought.&nbsp;<\/p>\n\n\n\n<p>Alan Binning is Regional Sales Manager at energy software supplier <strong><a href=\"http:\/\/www.copadata.com\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"COPA-DATA UK (opens in a new tab)\">COPA-DATA UK<\/a><\/strong>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential Protocols for cyber security in the energy industry are often limited to the prevention of data breaches.&nbsp; However, by infiltrating energy generation sites, hackers have the potential to cause much more damage than simply &hellip;<\/p>\n","protected":false},"author":1,"featured_media":11116,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[107],"tags":[524,5777,709],"class_list":["post-11115","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-power","tag-copa-data","tag-cyber-attack","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Defending attacks on critical infrastructure - Engineer News Network<\/title>\n<meta name=\"description\" content=\"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defending attacks on critical infrastructure - Engineer News Network\" \/>\n<meta property=\"og:description\" content=\"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Engineer News Network\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T10:17:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-11T10:17:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"headline\":\"Defending attacks on critical infrastructure\",\"datePublished\":\"2019-03-11T10:17:27+00:00\",\"dateModified\":\"2019-03-11T10:17:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/\"},\"wordCount\":690,\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/The_role_of_software_in_energy_grid_security_1024x512px.jpg\",\"keywords\":[\"COPA-DATA\",\"cyber-attack\",\"security\"],\"articleSection\":[\"Power\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/\",\"name\":\"Defending attacks on critical infrastructure - Engineer News Network\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/The_role_of_software_in_energy_grid_security_1024x512px.jpg\",\"datePublished\":\"2019-03-11T10:17:27+00:00\",\"dateModified\":\"2019-03-11T10:17:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\"},\"description\":\"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/The_role_of_software_in_energy_grid_security_1024x512px.jpg\",\"contentUrl\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/The_role_of_software_in_energy_grid_security_1024x512px.jpg\",\"width\":1024,\"height\":512,\"caption\":\"Predictions by security experts suggest that Britain would be uninhabitable in just days, should the grid be bought down by a cyber-attack. Image: COPA-DATA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/defending-attacks-on-critical-infrastructure\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defending attacks on critical infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/\",\"name\":\"Engineer News Network\",\"description\":\"The ultimate online news and information resource for today's engineer\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/#\\\/schema\\\/person\\\/4477342aea8e299c6a21761e513ea8e1\",\"name\":\"admin\",\"url\":\"https:\\\/\\\/www.engineernewsnetwork.com\\\/blog\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Defending attacks on critical infrastructure - Engineer News Network","description":"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/","og_locale":"en_GB","og_type":"article","og_title":"Defending attacks on critical infrastructure - Engineer News Network","og_description":"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential","og_url":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/","og_site_name":"Engineer News Network","article_published_time":"2019-03-11T10:17:27+00:00","article_modified_time":"2019-03-11T10:17:31+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#article","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/"},"author":{"name":"admin","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"headline":"Defending attacks on critical infrastructure","datePublished":"2019-03-11T10:17:27+00:00","dateModified":"2019-03-11T10:17:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/"},"wordCount":690,"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg","keywords":["COPA-DATA","cyber-attack","security"],"articleSection":["Power"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/","url":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/","name":"Defending attacks on critical infrastructure - Engineer News Network","isPartOf":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#primaryimage"},"image":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg","datePublished":"2019-03-11T10:17:27+00:00","dateModified":"2019-03-11T10:17:31+00:00","author":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1"},"description":"Alan Binning examines the potential disruption of attacks on energy generation facilities and explains why adherence to security standards are essential","breadcrumb":{"@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#primaryimage","url":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg","contentUrl":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-content\/uploads\/2019\/03\/The_role_of_software_in_energy_grid_security_1024x512px.jpg","width":1024,"height":512,"caption":"Predictions by security experts suggest that Britain would be uninhabitable in just days, should the grid be bought down by a cyber-attack. Image: COPA-DATA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/defending-attacks-on-critical-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.engineernewsnetwork.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Defending attacks on critical infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#website","url":"https:\/\/www.engineernewsnetwork.com\/blog\/","name":"Engineer News Network","description":"The ultimate online news and information resource for today's engineer","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.engineernewsnetwork.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.engineernewsnetwork.com\/blog\/#\/schema\/person\/4477342aea8e299c6a21761e513ea8e1","name":"admin","url":"https:\/\/www.engineernewsnetwork.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/comments?post=11115"}],"version-history":[{"count":1,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11115\/revisions"}],"predecessor-version":[{"id":11117,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/posts\/11115\/revisions\/11117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media\/11116"}],"wp:attachment":[{"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/media?parent=11115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/categories?post=11115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.engineernewsnetwork.com\/blog\/wp-json\/wp\/v2\/tags?post=11115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}