SlideShare a Scribd company logo
Cyber Security in
Power Grid
JISHNU PRADEEP
The US Power Grid
An electrical grid is an interconnected network for
delivering electricity from suppliers to consumers.
The U.S. power transmission grid consists of about
300,000 km (186,411 mi) of lines operated by
approximately 500 companies.
American homes, industries, and businesses are
deeply dependent on reliable electricity, so threats to
the consistent delivery of electricity put modern life
itself at risk.
Threats to the Power Grid
 Protecting the nation’s electricity grid from attacks is a critical
national security issue.
 Cyber attacks on key energy infrastructure—and on the electricity
system in particular—are increasing, both in frequency and
sophistication. These trends are alarming because the potential
consequences of a successful large-scale cyber attack.
Cyber attacks in Power Grids
 Infecting industrial systems, such as power grids, with malware is so simple that
there are 5-minute YouTube tutorials on how to do it. By overwhelming network
links with traffic in a DDoS attack, Internet users or cyber-terrorists can and
have removed the ability of utilities to communicate with their own electrical
grids, effectively causing a blackout.
 The estimated price for 24 hours of consistent DDoS attack is a mere $40, making
such attacks available to pretty much anybody.
 What makes this attacks worse? Difficult to spot, even when they are happening

Recommended for you

AI Techniques for Smart Grids
AI Techniques for Smart GridsAI Techniques for Smart Grids
AI Techniques for Smart Grids

These are the slides for my keynote lecture "AI Techniques for Smart Grids" at the 2014 IEEE Innovative Smart Grid Technologies - Asia conference where I discussed the role and potential of self-organization in the smart grid.

self-organizationsmart gridself-organizing systems
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRIDDISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID

This document discusses distributed generation and the smart grid environment. It provides an introduction to the need for changes in energy generation, delivery, and use to establish sustainability and restore environmental balance. The document then discusses different forms of renewable energy sources and distributed generation. It describes some of the challenges of distributed generation and how a smart grid can help solve these issues. Finally, it discusses components of the smart grid like advanced metering infrastructure and phasor measurement units, and the benefits of integrating distributed generation with the smart grid.

SMART GRID
SMART GRIDSMART GRID
SMART GRID

This document discusses smart grid technology in India. It begins with an introduction to smart grids and the current one-way electricity transmission system. It then discusses India's increasing electricity needs and deficits. The main points are: - A smart grid uses communication technology to collect data from suppliers and consumers to automate distribution management. - Smart grids have two-way interaction and include components like smart meters, distributed generation, and information transfer. - Smart grids can help reduce carbon footprints, improve efficiency, enable self-healing of outages, and increase use of renewable energy through technologies like smart meters and distributed generation.

Results in a ‘nightmare scenario’
 Stores closed. Cell service fails. Broadband Internet is compromised.
 Hospitals are operating on generators, but rapidly running out of fuel.
 Water supply will be hit.
 Commerce would be brought to a standstill.
 Transport and Communication lines disrupted.
 Crimes will surge.
 The geopolitical fallout could be even worse.
RESULT: Complete Chaos!
The scenario isn’t completely hypothetical.
Cyber Security of Power grids
Vulnerabilities
 The power grid is controlled by more than just a panel of
digital buttons.
 Grid operation depends on control systems—called
Supervisory Control And Data Acquisition (SCADA)—that
monitor and control the physical infrastructure.
 The U.S. electrical grid is decentralized network owned by
numerous local operators.
 Any smart meters connected to the internet can be easily
exploited.
The U.S. power grid is full of seams that can be exploited
by hackers.
Examples of Cyber Attacks on Energy
Systems
 Stuxnet (worm): It gained attention for the damage it caused at a nuclear facility in
Iran.
 Aurora: The planned cyber attack on a generator control system led to the
destruction of the generator and a fire.
 Slammer (SQL Server worm): The worm disabled a safety-monitoring system for
several hours and led to a temporary failure of a nuclear power plant’s process
computer.
 Shamoon (virus): The national oil company of Saudi Arabia, Aramco, reported in
2012 that this was responsible for damaging about 30,000 computers in an effort to
disrupt energy and oil production.

Recommended for you

Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid

The presentation is on Wireless Smart Grid. In this about the technology about the preparation on smart grid to wireless smart grid.

Smart grid
Smart gridSmart grid
Smart grid

The document discusses the smart grid, which aims to address issues with today's electrical grid such as blackouts and one-way communication. It introduces the concept of adding "intelligence infrastructure" like smart meters, transmission upgrades, energy storage, and networked appliances. This smart infrastructure enables features like demand response, distributed generation, electric vehicles, optimized asset use, and problem detection. Key components are discussed in more detail, including smart meters, electric vehicles, and potential partners for building smart grid cities. The conclusion outlines how the smart grid facilitates changes to electricity production, transmission and consumption while supporting environmental and customer control goals.

seminar report on power quality monitoring
seminar report on power quality monitoring  seminar report on power quality monitoring
seminar report on power quality monitoring

The document discusses power quality monitoring and its importance for sustainable energy systems like solar power in India. It provides context on increased sensitivity of modern equipment to power quality issues and defines different types of steady state variations and events that impact power quality. Monitoring objectives include proactive and reactive approaches to characterize system performance and identify specific problems. The development of an intelligent power quality monitoring system using LabVIEW and sensors is described to efficiently monitor power quality in sustainable energy systems.

power quality monitoring
Attack on Ukrainian Power Grid
 Took place on 23 December 2015 and is a considered to
be the first known successful cyber attack on a power
grid.
 Hackers were able to successfully compromise
information systems of three energy distribution
companies in Ukraine and temporary disrupt electricity
supply.
 They took out 60 substations leaving 700,000 residents in
the dark. This attack was relatively short-lived (7 hours)
and benign. The next one might not be.
Steps involved:
 Prior compromise of corporate networks using spear-fishing emails with
BlackEnergy malware.
 Seizing SCADA under control, remotely switching substations off.
 Disabling IT infrastructure components(UPS, Modem).
 Destruction of files stored on servers and workstations with the KillDisk malware.
 Denial-of-service attack on call-center to deny consumers up-to-date information
on the blackout.
BlackEnergy3 and KillDisk Malwares
 What is it? BlackEnergy is a Trojan malware designed to launch
DDoS attacks, download custom spam, and banking information-
stealer plugins.
 Function: BlackEnergy malware was known to have been used to
deliver KillDisk, a feature that could render systems unusable and
could obliterate critical components on an infected system.
 Who is responsible? The Ukraine attack has been attributed
to Sandworm, a Russian cyber espionage group known to have
been harassing Ukrainian officials.

More Related Content

What's hot

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
amaljose949563
 
Switchgear and protection 2
Switchgear and protection 2Switchgear and protection 2
Switchgear and protection 2
Md Irshad Ahmad
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
P K Agarwal
 
AI Techniques for Smart Grids
AI Techniques for Smart GridsAI Techniques for Smart Grids
AI Techniques for Smart Grids
Wilfried Elmenreich
 
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRIDDISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
NIT MEGHALAYA
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
Debasis Mohanty
 
Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid
R-One Power
 
Smart grid
Smart gridSmart grid
Smart grid
Praneeth Reddy
 
seminar report on power quality monitoring
seminar report on power quality monitoring  seminar report on power quality monitoring
seminar report on power quality monitoring
khemraj298
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
Vikram Purohit
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
Amarjeet S Pandey
 
Power system protection seminar report
Power system protection seminar reportPower system protection seminar report
Power system protection seminar report
Rahul Aman
 
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPTMicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
 Abin Baby
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
Chinedu Opara
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
Eurotech
 
What is Smart grid
What is Smart gridWhat is Smart grid
What is Smart grid
Pasala Naresh
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
Abhishek Kumar
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgrid
Amarjeet S Pandey
 
Primry & backup protection
Primry & backup protectionPrimry & backup protection
Primry & backup protection
qasmi100
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
Venkata Satya Naveen KSS
 

What's hot (20)

Cyber security in Smart grid system
Cyber security in Smart grid systemCyber security in Smart grid system
Cyber security in Smart grid system
 
Switchgear and protection 2
Switchgear and protection 2Switchgear and protection 2
Switchgear and protection 2
 
Cyber security of power grid
Cyber security of power gridCyber security of power grid
Cyber security of power grid
 
AI Techniques for Smart Grids
AI Techniques for Smart GridsAI Techniques for Smart Grids
AI Techniques for Smart Grids
 
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRIDDISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
DISTRIBUTED GENERATION ENVIRONMENT WITH SMART GRID
 
SMART GRID
SMART GRIDSMART GRID
SMART GRID
 
Wireless smart grid
Wireless smart gridWireless smart grid
Wireless smart grid
 
Smart grid
Smart gridSmart grid
Smart grid
 
seminar report on power quality monitoring
seminar report on power quality monitoring  seminar report on power quality monitoring
seminar report on power quality monitoring
 
Web based power quality monitoring system
Web based power quality monitoring systemWeb based power quality monitoring system
Web based power quality monitoring system
 
Protection and control of Microgrid
Protection and control of MicrogridProtection and control of Microgrid
Protection and control of Microgrid
 
Power system protection seminar report
Power system protection seminar reportPower system protection seminar report
Power system protection seminar report
 
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPTMicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT
 
Smart grid chinedu opara(m00560830)
Smart grid   chinedu opara(m00560830)Smart grid   chinedu opara(m00560830)
Smart grid chinedu opara(m00560830)
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
What is Smart grid
What is Smart gridWhat is Smart grid
What is Smart grid
 
Smart grid challenge
Smart grid challengeSmart grid challenge
Smart grid challenge
 
Interconnection issue in microgrid
Interconnection issue in microgridInterconnection issue in microgrid
Interconnection issue in microgrid
 
Primry & backup protection
Primry & backup protectionPrimry & backup protection
Primry & backup protection
 
Reactive power compensation
Reactive power compensationReactive power compensation
Reactive power compensation
 

Viewers also liked

The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
Venafi
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Community Protection Forum
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
GE Grid Solutions
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
José Reynaldo Formigoni Filho, MSc
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Jishnu Pradeep
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
Vladimir Matviychuk
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
Zakaria Zubi
 
Educ 2 d slideshare
Educ 2 d slideshareEduc 2 d slideshare
Educ 2 d slideshare
Mhel Cañete
 
Vilde icon
Vilde icon Vilde icon
Vilde icon
SofiaNim
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
Mohammad Salman
 
61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems
GE Grid Solutions
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
saddamhusain hadimani
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
Jishnu Pradeep
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
Settapong_CyberSecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
mahendra_chauhan
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
Engineers Australia
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
canaleenergia
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
anthony4web
 

Viewers also liked (20)

The Evolution of Cyber Attacks
The Evolution of Cyber AttacksThe Evolution of Cyber Attacks
The Evolution of Cyber Attacks
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
61850easy Test Tool 2013
61850easy Test Tool 201361850easy Test Tool 2013
61850easy Test Tool 2013
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
Paper Presentation - "Your Botnet is my Botnet : Analysis of a Botnet Takeover"
 
Insights on it risks cyber attacks
Insights on it risks cyber attacksInsights on it risks cyber attacks
Insights on it risks cyber attacks
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 
Educ 2 d slideshare
Educ 2 d slideshareEduc 2 d slideshare
Educ 2 d slideshare
 
Vilde icon
Vilde icon Vilde icon
Vilde icon
 
understanding networked infrastructure
understanding networked infrastructureunderstanding networked infrastructure
understanding networked infrastructure
 
61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems61850easy Test Tool for IEC 61850 Networks & Systems
61850easy Test Tool for IEC 61850 Networks & Systems
 
Analysis of database tampering
Analysis of database tamperingAnalysis of database tampering
Analysis of database tampering
 
Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)Secure Data Sharing in Cloud (SDSC)
Secure Data Sharing in Cloud (SDSC)
 
Basic concept cybersecurity
Basic concept cybersecurityBasic concept cybersecurity
Basic concept cybersecurity
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
The Not So Smart Grid
The Not So Smart GridThe Not So Smart Grid
The Not So Smart Grid
 
Mysore, pilot project
Mysore, pilot projectMysore, pilot project
Mysore, pilot project
 
CYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCECYBERCRIMES AND DUE DILIGENCE
CYBERCRIMES AND DUE DILIGENCE
 

Similar to Cyber Security of Power grids

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
George Wainblat
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
nilesh405711
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart Grid
Josh Wentz
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
Mahesh Chandra Manav
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
George Wainblat
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
todd521
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
journalBEEI
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
Muhammad FAHAD
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
IJRES Journal
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Ahmed Al Enizi
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
IRJET Journal
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
International Journal of Engineering Inventions www.ijeijournal.com
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
Divya Watson
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
Senghuo LY
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
Richard Umbrino
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Business Days
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
Hamza AlBzoor
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Show
mjsmith9
 
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in SocietyLockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed-Martin
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
Joe Slowik
 

Similar to Cyber Security of Power grids (20)

Critical infrastructures brochure
Critical infrastructures brochureCritical infrastructures brochure
Critical infrastructures brochure
 
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
A_Review_of_Cybersecurity_in_Grid-Connected_Power_Electronics_Converters_Vuln...
 
US Power Grid Vs. Smart Grid
US Power Grid Vs. Smart GridUS Power Grid Vs. Smart Grid
US Power Grid Vs. Smart Grid
 
Presentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue systemPresentation for power plant 2021 by link vue system
Presentation for power plant 2021 by link vue system
 
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMSCYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
CYBER SECURITY TRANDS FOR FUTURE SMART GRID SYSTEMS
 
Running head SMART GRID .docx
Running head SMART GRID                                          .docxRunning head SMART GRID                                          .docx
Running head SMART GRID .docx
 
Smart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security IssuesSmart Grid Systems Based Survey on Cyber Security Issues
Smart Grid Systems Based Survey on Cyber Security Issues
 
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations. Cyber-attac...
 
Encryption Security in SCADA Networks
Encryption Security in SCADA NetworksEncryption Security in SCADA Networks
Encryption Security in SCADA Networks
 
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
Protecting Industrial Control Systems V1.2, Ahmad Alanazy, 2012
 
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...Fault Prediction and Interdependencies Identification in Smart Grids Using De...
Fault Prediction and Interdependencies Identification in Smart Grids Using De...
 
Utilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA NetworksUtilization of Encryption for Security in SCADA Networks
Utilization of Encryption for Security in SCADA Networks
 
Power System Essay
Power System EssayPower System Essay
Power System Essay
 
8 fault-analysis-and-electrical
8 fault-analysis-and-electrical8 fault-analysis-and-electrical
8 fault-analysis-and-electrical
 
Cyber Security for SCADA
Cyber Security for SCADACyber Security for SCADA
Cyber Security for SCADA
 
Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020Yugo Neumorni - prezentare - Cyber Security Trends 2020
Yugo Neumorni - prezentare - Cyber Security Trends 2020
 
Cyber-security of smart grids
Cyber-security of smart gridsCyber-security of smart grids
Cyber-security of smart grids
 
Trans Block Show
Trans Block ShowTrans Block Show
Trans Block Show
 
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in SocietyLockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
Lockheed Martin - Integrated Infrastructure: Cyber Resiliency in Society
 
Thrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In ReviewThrice Is Nice: Ukraine In Review
Thrice Is Nice: Ukraine In Review
 

Recently uploaded

Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
VICTOR MAESTRE RAMIREZ
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
Tool and Die Tech
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Bert Blevins
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
Prakhyath Rai
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
Rafael Santos
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
peacekipu
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
rebecca841358
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
Celine George
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
sharvaridhokte
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
sipij
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
PriyankaKarn3
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
pavanaroshni1977
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
naseki5964
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
yadavsuyash008
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
IIIT Hyderabad
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
Kamal Acharya
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
aarusi sexy model
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
ProexportColombia1
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
maisnampibarel
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
IJAEMSJORNAL
 

Recently uploaded (20)

Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
Advances in Detect and Avoid for Unmanned Aircraft Systems and Advanced Air M...
 
Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.Trends in Computer Aided Design and MFG.
Trends in Computer Aided Design and MFG.
 
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and PreventionUnderstanding Cybersecurity Breaches: Causes, Consequences, and Prevention
Understanding Cybersecurity Breaches: Causes, Consequences, and Prevention
 
Software Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project ManagementSoftware Engineering and Project Management - Introduction to Project Management
Software Engineering and Project Management - Introduction to Project Management
 
Evento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recapEvento anual Splunk .conf24 Highlights recap
Evento anual Splunk .conf24 Highlights recap
 
Lecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdfLecture 6 - The effect of Corona effect in Power systems.pdf
Lecture 6 - The effect of Corona effect in Power systems.pdf
 
Germany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptxGermany Offshore Wind 010724 RE (1) 2 test.pptx
Germany Offshore Wind 010724 RE (1) 2 test.pptx
 
How to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POSHow to Manage Internal Notes in Odoo 17 POS
How to Manage Internal Notes in Odoo 17 POS
 
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
22519 - Client-Side Scripting Language (CSS) chapter 1 notes .pdf
 
Exploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative ReviewExploring Deep Learning Models for Image Recognition: A Comparative Review
Exploring Deep Learning Models for Image Recognition: A Comparative Review
 
Conservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic RegenerationConservation of Taksar through Economic Regeneration
Conservation of Taksar through Economic Regeneration
 
LeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdfLeetCode Database problems solved using PySpark.pdf
LeetCode Database problems solved using PySpark.pdf
 
L-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptxL-3536-Cost Benifit Analysis in ESIA.pptx
L-3536-Cost Benifit Analysis in ESIA.pptx
 
Chlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptxChlorine and Nitric Acid application, properties, impacts.pptx
Chlorine and Nitric Acid application, properties, impacts.pptx
 
Response & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITHResponse & Safe AI at Summer School of AI at IIITH
Response & Safe AI at Summer School of AI at IIITH
 
Social media management system project report.pdf
Social media management system project report.pdfSocial media management system project report.pdf
Social media management system project report.pdf
 
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model SafePaharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
Paharganj @ℂall @Girls ꧁❤ 9873777170 ❤꧂VIP Arti Singh Top Model Safe
 
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdfGUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
GUIA_LEGAL_CHAPTER-9_COLOMBIAN ELECTRICITY (1).pdf
 
Development of Chatbot Using AI/ML Technologies
Development of  Chatbot Using AI/ML TechnologiesDevelopment of  Chatbot Using AI/ML Technologies
Development of Chatbot Using AI/ML Technologies
 
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
Profiling of Cafe Business in Talavera, Nueva Ecija: A Basis for Development ...
 

Cyber Security of Power grids

  • 1. Cyber Security in Power Grid JISHNU PRADEEP
  • 2. The US Power Grid An electrical grid is an interconnected network for delivering electricity from suppliers to consumers. The U.S. power transmission grid consists of about 300,000 km (186,411 mi) of lines operated by approximately 500 companies. American homes, industries, and businesses are deeply dependent on reliable electricity, so threats to the consistent delivery of electricity put modern life itself at risk.
  • 3. Threats to the Power Grid  Protecting the nation’s electricity grid from attacks is a critical national security issue.  Cyber attacks on key energy infrastructure—and on the electricity system in particular—are increasing, both in frequency and sophistication. These trends are alarming because the potential consequences of a successful large-scale cyber attack.
  • 4. Cyber attacks in Power Grids  Infecting industrial systems, such as power grids, with malware is so simple that there are 5-minute YouTube tutorials on how to do it. By overwhelming network links with traffic in a DDoS attack, Internet users or cyber-terrorists can and have removed the ability of utilities to communicate with their own electrical grids, effectively causing a blackout.  The estimated price for 24 hours of consistent DDoS attack is a mere $40, making such attacks available to pretty much anybody.  What makes this attacks worse? Difficult to spot, even when they are happening
  • 5. Results in a ‘nightmare scenario’  Stores closed. Cell service fails. Broadband Internet is compromised.  Hospitals are operating on generators, but rapidly running out of fuel.  Water supply will be hit.  Commerce would be brought to a standstill.  Transport and Communication lines disrupted.  Crimes will surge.  The geopolitical fallout could be even worse. RESULT: Complete Chaos! The scenario isn’t completely hypothetical.
  • 7. Vulnerabilities  The power grid is controlled by more than just a panel of digital buttons.  Grid operation depends on control systems—called Supervisory Control And Data Acquisition (SCADA)—that monitor and control the physical infrastructure.  The U.S. electrical grid is decentralized network owned by numerous local operators.  Any smart meters connected to the internet can be easily exploited. The U.S. power grid is full of seams that can be exploited by hackers.
  • 8. Examples of Cyber Attacks on Energy Systems  Stuxnet (worm): It gained attention for the damage it caused at a nuclear facility in Iran.  Aurora: The planned cyber attack on a generator control system led to the destruction of the generator and a fire.  Slammer (SQL Server worm): The worm disabled a safety-monitoring system for several hours and led to a temporary failure of a nuclear power plant’s process computer.  Shamoon (virus): The national oil company of Saudi Arabia, Aramco, reported in 2012 that this was responsible for damaging about 30,000 computers in an effort to disrupt energy and oil production.
  • 9. Attack on Ukrainian Power Grid  Took place on 23 December 2015 and is a considered to be the first known successful cyber attack on a power grid.  Hackers were able to successfully compromise information systems of three energy distribution companies in Ukraine and temporary disrupt electricity supply.  They took out 60 substations leaving 700,000 residents in the dark. This attack was relatively short-lived (7 hours) and benign. The next one might not be.
  • 10. Steps involved:  Prior compromise of corporate networks using spear-fishing emails with BlackEnergy malware.  Seizing SCADA under control, remotely switching substations off.  Disabling IT infrastructure components(UPS, Modem).  Destruction of files stored on servers and workstations with the KillDisk malware.  Denial-of-service attack on call-center to deny consumers up-to-date information on the blackout.
  • 11. BlackEnergy3 and KillDisk Malwares  What is it? BlackEnergy is a Trojan malware designed to launch DDoS attacks, download custom spam, and banking information- stealer plugins.  Function: BlackEnergy malware was known to have been used to deliver KillDisk, a feature that could render systems unusable and could obliterate critical components on an infected system.  Who is responsible? The Ukraine attack has been attributed to Sandworm, a Russian cyber espionage group known to have been harassing Ukrainian officials.

Editor's Notes

  1. Every single home, industry and business depends greatly on electricity and any sort of disruption to the power grid would put modern life at risk.
  2. Out of all the threats faced by the power grid including weather, Cyberattacks are the ones to watch out for. It is increasing in both frequency and sophistication.
  3. By overwhelming network links with traffic in a DDOS attack, cyber terrorists can disable power grids causing blackouts.
  4. Any disruption to power grids would result in a nightmare scenario where all communication and transportation lines will be affected bringing life to a standstill.
  5. Moreover, with the advent of smart grid systems, Blackouts such as this, shown in Watchdogs, would not just exist in games, but also in everyday life.
  6. All the generating plants and substations are connected to a control center through a public network. Attacks are mainly launched through these decentralized networks. Even the IOT smart meters connected to internet become an easy target.
  7. Examples of a few cyber attacks launched against energy systems.
  8. World’s first power outage caused by hackers. They successfully managed to compromise information systems of 3 energy distribution companies to disrupt electricity in Ukraine, leaving 700,000 residents in the dark for 7 hours.
  9. Spear phishing is an e-mail spoofing fraud attempt that targets a specific organization, seeking unauthorized access to confidential data. Consumers were denied information about the blackout.
  10. Blackenergy is a trojan malware that launches a DDOS attack to deliver killdisk malware which in turn destroys files on information systems. A Russian group of hackers called Sandworm has been claimed to be responsible for this attack.