A platform for research: civil engineering, architecture and urbanism
The Case for Cyber Security in the Water Sector
This article begins by presenting federal regulations that establish a baseline for all entities to build justified security controls into water sector systems. The article discusses the transition over the past decade of water systems from isolated and proprietary control systems to a converged network of systems that connect operations to the administrative environment. However, these benefits were accompanied by increased vulnerabilities to cyber threats. Drivers for implementing cyber security are discussed and include: regulations; a high‐profile event; cost; and, reputation risk. Five low‐ or no‐cost steps are provided for quickly mitigating cyber risks.
The Case for Cyber Security in the Water Sector
This article begins by presenting federal regulations that establish a baseline for all entities to build justified security controls into water sector systems. The article discusses the transition over the past decade of water systems from isolated and proprietary control systems to a converged network of systems that connect operations to the administrative environment. However, these benefits were accompanied by increased vulnerabilities to cyber threats. Drivers for implementing cyber security are discussed and include: regulations; a high‐profile event; cost; and, reputation risk. Five low‐ or no‐cost steps are provided for quickly mitigating cyber risks.
The Case for Cyber Security in the Water Sector
Moyer, Jack (author) / Dakin, Rick (author) / Hewman, Richard (author) / Groves, Daniel (author)
Journal ‐ American Water Works Association ; 101 ; 30-32
2009-12-01
3 pages
Article (Journal)
Electronic Resource
English
Assessing Cyber Security Risk for the Dams Sector
NTIS | 2018
|Update on Dams Sector Cyber-Security Task Force
British Library Conference Proceedings | 2013
|Wiley | 2016
|Smart Water Networks and Cyber Security
British Library Online Contents | 2016
|Smart Water Networks and Cyber Security
Online Contents | 2016
|