And just how real is the cyber threat?

Jan. 8, 2008
How real is cyber? Last Friday, I met with an electric utility with combined cycle power plants. I mentioned the potential vulnerability of the electronic (cyber) link from the combustion turbine vendor to the utility. On Monday, I got the following e-mail: "Saturday after remotely tuning the unit, the combustion turbine vendor gave the clearance to open the cyber connection to disconnect them from our system. Unfortunately an operator was downloading a file at the time and ...
How real is cyber? Last Friday, I met with an electric utility with combined cycle power plants. I mentioned the potential vulnerability of the electronic (cyber) link from the combustion turbine vendor to the utility. On Monday, I got the following e-mail: "Saturday after remotely tuning the unit, the combustion turbine vendor gave the clearance to open the cyber connection to disconnect them from our system. Unfortunately an operator was downloading a file at the time and as a result the plant tripped." The utility now recognizes the need improved policies and procedures. Cyber is real and has a direct impact on plant (and other key operational assets) reliability and utility costs.  Joe Weiss

Sponsored Recommendations

IEC 62443 4-1 Cyber Certification – Why ML 3 is So Important

The IEC 62443 Security for Industrial Automation and Control Systems - Part 4-1: Secure Product Development Lifecycle Requirements help increase resilience for control systems...

Multi-Server SCADA Maintenance Made Easy

See how the intuitive VTScada Services Page ensures your multi-server SCADA application remains operational and resilient, even when performing regular server maintenance.

Your Industrial Historical Database Should be Designed for SCADA

VTScada's Chief Software Architect discusses how VTScada's purpose-built SCADA historian has created a paradigm shift in industry expectations for industrial redundancy and performance...

Linux and SCADA – What You May Not Have Considered

There’s a lot to keep in mind when considering the Linux® Operating System for critical SCADA systems. See how the Linux security model compares to Windows® and Mac OS®.