Cyber attacks on Energy and Utility Companies

A new threat that has become of particular concern to cybersecurity agents worldwide is the attack on Industrial Automation systems that manage the infrastructure of energy and utility companies. Last May, cyber-attacks on the oil pipeline management company Colonial Pipeline co. Became known, which resulted in a significant shortage of fuel throughout the East Coast of the United States for a few days.

But another very serious case, which took place, is the attempted cyber attack on the water company of the city of Oldsmar in Florida (USA) last February. The hackers managed to gain access to the water purification management system and tried to dangerously increase the level of use of caustic soda in the purification of drinking water, which would lead to very serious poisonings. Although Fortunately the attack was averted thanks to an employee who noticed the change in regulation in time, the incident proved that a cyber attack on such systems can lead to significant natural disasters threatening even human lives.

For many years the risk of cyber-attack on Industrial Automation systems was considered quite low. This is because these systems typically operate in closed networks, isolated from the internet and the rest of the company’s information systems.

But the need to make better use of the data generated by infrastructure networks, for example, oil pipelines, smart meters and the creation of consumer products, for example, premiums and lower energy consumption in times of overload of the electrical system, as well as other digital switching opportunities. lead to a great interconnection of Industrial Automation Systems with the other systems of an organization.

To these factors is added the escalating activity of cybercrime organization that are active specifically in these sectors such as Electrum, Xenotime, Allanite and others.

Why is the energy sector so vulnerable to hacking? | IT PRO

The security of Industrial Automation Systems is one of the first priorities but also one of the biggest challenges in an organization. The characteristics of these systems differ significantly from the traditional information systems that support an organization’s business processes.

Their useful life is usually more than ten years, with the result that many of the systems today operate with outdated security architectures that can easily be violated. In addition, an industrial automation system needs to operate in an extensive geographical area and with data centers or sensors in various parts of the infrastructure it manages.

This often forces organizations to set up decentralized IT and security teams for these systems, a practice that has shown, however, that it usually creates a watertight and ineffective implementation of a single security framework. Therefore, it is important for the responsibility of the security officer to open the responsibility for the security of the industrial automation systems, something that is observed to be pushed more and more today by the organizations.

About the author

The Liberal Globe is an independent online magazine that provides carefully selected varieties of stories. Our authoritative insight opinions, analyses, researches are reflected in the sections which are both thematic and geographical. We do not attach ourselves to any political party. Our political agenda is liberal in the classical sense. We continue to advocate bold policies in favour of individual freedoms, even if that means we must oppose the will and the majority view, even if these positions that we express may be unpleasant and unbearable for the majority.

Leave a Reply

Your email address will not be published. Required fields are marked *